<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.34 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-uri-path-abbrev-04" category="std" consensus="true" submissionType="IETF" updates="7252" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="Uri-Path-Abbrev">URI-Path abbreviation in CoAP</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-uri-path-abbrev-04"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <author initials="M." surname="Richardson" fullname="Michael Richardson">
      <organization>Sandelman Software Works</organization>
      <address>
        <email>mcr+ietf@sandelman.ca</email>
      </address>
    </author>
    <date year="2026" month="March" day="19"/>
    <workgroup>CoRE</workgroup>
    <keyword>coap</keyword>
    <abstract>
      <?line 51?>

<t>Applications built on CoAP face a conflict between the technical need for short message sizes
and the interoperability requirement of following BCP190
and thus using (relatively verbose) well-known URI paths.
This document introduces a CoAP option that allows expressing well-known URI paths in as little as two bytes.</t>
      <t>Negotiating the use of this option between client and server revealed a subtle flaw in RFC7252.
This document updates RFC7252 to rectify it, thus making the extension point of critical options more useful.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-core-uri-path-abbrev/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Constrained RESTful Environments Working Group mailing list (<eref target="mailto:core@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/core/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/core-wg/uri-path-abbrev"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>When building application components on CoAP (<xref target="RFC7252"/>),
sending small messages is a general goal in the ecosystem
(i.e., constrained environments, where data rates are limited and large packets can lead to packet loss, see <xref target="RFC7228"/>).
While CoAP can operate with a wide range of URIs,
short path names are therefore favored.</t>
      <t>Those short path names need to be discovered, and <xref target="RFC7252"/> and <xref target="RFC6690"/> provide mechanisms for that.
Applications that can not discover such paths because they precede a discovery step,
such as the discovery itself, setting up a security context (<xref target="RFC9528"/>) or establishing an initial identity (<xref target="RFC9148"/>)
can not rely on discovered short paths,
and need to use well-known paths.
The best practice established in <xref target="BCP190"/>
requires applications to use the prefix ".well-known" for their paths,
making the combined size of the URI path options easily longer than the rest of the CoAP message.</t>
      <t>This document establishes a CoAP option that allows abbreviating the path component of the request URI by encoding
the path component as a single number.
A registry is established to maintain the mapping between numbers and URI paths.</t>
      <section anchor="motivating-example">
        <name>Motivating example</name>
        <t>The design criteria for EDHOC <xref target="RFC9528"/> described in <xref section="2.11" sectionFormat="of" target="I-D.ietf-lake-reqs-04"/>
give a frame fragmentation limit of 47 bytes for a CoAP message payload for 6TiSCH and 51 bytes for some parameters (and implementations) of LoRaWAN,
and imply high performance penalties of a CoAP message not fitting in a single frame.
An EDHOC message 1 on its own carries a minimum of 37 bytes.
The 18 bytes of an encoded "/.well-known/edhoc" URI path push the CoAP message size over either limit,
whereas an equivalent Uri-Path-Abbrev option lets the message stay well below these limits.</t>
      </section>
      <section anchor="update-to-rfc7252">
        <name>Update to RFC7252</name>
        <t>The use of a critical CoAP option that is not understood by the server has a CoAP response error code (4.02 Bad Option) assigned,
which generally enables clients to retry without using the critical option.
This mechanism is useful for the abbreviation mechanism of this document.</t>
        <t>That mechanism got conflated into the mechanism of <em>rejecting</em> a request established in <xref section="4.2" sectionFormat="of" target="RFC7252"/> for handling unprocessable non-confirmable messages,
which makes detection of missing option support less reliable.</t>
        <t><xref target="update7252"/> of this document updates <xref section="5.4.1" sectionFormat="of" target="RFC7252"/> to repair the behavior of servers when they receive an unsupported critical option in a non-confirmable message.</t>
      </section>
      <section anchor="conventions-and-definitions">
        <name>Conventions and Definitions</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>This document assumes basic familiarity with CoAP (<xref target="RFC7252"/>),
in particular its Uri-* options.</t>
        <t>The term "expand" is used to refer to the process of translating a Uri-Path-Abbrev option into an equivalent
sequence of Uri-Path options.
The term "abbreviate" is used to refer to the reverse process of translating a sequence of one or more Uri-Path
options into a single Uri-Path-Abbrev option.</t>
      </section>
    </section>
    <section anchor="the-uri-path-abbrev-option">
      <name>The Uri-Path-Abbrev option</name>
      <t>The Uri-Path-Abbrev option (short for "URI path, abbreviated") expresses a request's URI path in a more compact form.</t>
      <t>The Uri-Path-Abbrev value represents a particular URI path,
and is thus equivalent to any number of Uri-Path options.
Those paths are typically in a "/.well-known" location as described in <xref target="RFC8615"/>.
The numeric option values are coordinated by IANA in the Uri-Path-Abbrev registry established in this document in <xref target="iana-reg"/>.</t>
      <table anchor="option-table">
        <name>Uri-Path-Abbrev Option Summary (C = Critical, U = Unsafe, N = NoCacheKey, R = Repeatable)</name>
        <thead>
          <tr>
            <th align="left">No.</th>
            <th align="left">C</th>
            <th align="left">U</th>
            <th align="left">N</th>
            <th align="left">R</th>
            <th align="left">Name</th>
            <th align="left">Format</th>
            <th align="left">Len.</th>
            <th align="left">Default</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">CPA13</td>
            <td align="left">x</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">Uri-Path-Abbrev</td>
            <td align="left">uint</td>
            <td align="left">0-4</td>
            <td align="left">(none)</td>
          </tr>
        </tbody>
      </table>
      <t><cref anchor="cpa">RFC-Editor: This document uses the CPA (code point allocation)
  convention described in <xref target="I-D.bormann-cbor-draft-numbers"/>.  For
  each usage of the term "CPA", please remove the prefix "CPA"
  from the indicated value and replace the residue with the value
  assigned by IANA; perform an analogous substitution for all other
  occurrences of the prefix "CPA" in the document.  Finally,
  please remove this note.
  There is one occurrence of the value 13 encoded in <tt>a1270d</tt>,
  which, if the number were to change, would need updating.</cref></t>
      <t>The option is critical, safe-to-forward, part of the cache key, non-repeatable
and used in CoAP requests.
<xref target="option-table"/> summarizes these, extending Table 4 of <xref target="RFC7252"/>).
Its OSCORE treatment is as Class E (<xref target="RFC8613"/>).</t>
      <t>The option has an integer value
from the registry established in <xref target="iana-reg"/>.</t>
      <t>Apart from the format and repeatability,
the option's properties only deviate from the Uri-Path (for which it stands in)
in that this option is safe to forward.
This has consequences for its interactions with the Proxy-Uri option,
but these consequences are generally desirable:
It allows the option to be used with CoAP proxies that do not implement the option.</t>
      <section anchor="server-processing">
        <name>Server processing</name>
        <t>A CoAP server receiving this option processes it like the equivalent sequence of Uri-Path options.</t>
        <t>A server that supports a specific Uri-Path-Abbrev value
<bcp14>MUST</bcp14> also support the equivalent request where the URI path is composed of Uri-Path options.</t>
        <t>A server receiving the option with an unknown value <bcp14>MUST</bcp14> treat it as an unprocessable critical option,
returning a 4.02 Bad Option response,
and <bcp14>MUST NOT</bcp14> return a 4.04 Not Found response,
because the equivalent path may be present on the server.</t>
        <t>Since CoAP clients that use the option are usually aware of the possibility of failure,
there is no need to provide a diagnostic payload in the error (as is generally recommended in <xref section="5.4.1" sectionFormat="of" target="RFC7252"/>).
A machine-readable (and, albeit beyond the scope of this document, actionable) response is described in <xref section="3.1.1" sectionFormat="of" target="RFC9290"/>:
the server can set Content-Format 257 in the response and send the payload <tt>a1270d</tt>,
which is the CBOR encoding for the CoAP problem detail "Unprocessed CoAP option" with the value CPA13.</t>
      </section>
      <section anchor="clientprocessing">
        <name>Client processing</name>
        <t>A CoAP client can use the option instead of one or more Uri-Path option(s) if there is a suitable Uri-Path-Abbrev value
that can express the requested URI path.</t>
        <t>The option <bcp14>SHOULD</bcp14> only be sent when it is known that the CoAP server has support for the concrete value.
This knowledge is typically not learned/discovered, but follows from other specifications mandating support for it.</t>
        <t>A client can also send a value if it is merely likely that the server supports it.
(The decision threshold varies by application, but generally it's closer to 95% than a mere more-likely-than-not).
This is called "tentative use" of the option.</t>
        <t>In that case, the client needs to reliably detect failure of the option processing,
and needs to fall back to repeating the request with the Uri-Path spelled out (using Uri-Path options),
to operate reliably.</t>
        <t>The client can expect that a server which does not support the Uri-Path-Abbrev option
responds with 4.02 Bad Option.
Diverging behavior has been allowed until the changes in <xref target="update7252"/> have been made.
To account for older servers, the full set of reactions to expect is:</t>
        <ol spacing="normal" type="1"><li>
            <t>A 4.02 Bad Option response.</t>
          </li>
          <li>
            <t>A 5.02 Bad Gateway response caused by a proxy that received a RST message or lack of response.</t>
          </li>
          <li>
            <t>Having sent a Non-confirmable request message: A RST message.</t>
          </li>
          <li>
            <t>Having sent a Non-confirmable request message: Not receiving a response.</t>
          </li>
        </ol>
        <t>Some of the complexity of detecting lack of server-side support (items 3 and 4) can be avoided
by not using the option with Non-confirmable requests in tentative use.
Clients that know that the server supports <em>any</em> Uri-Path-Abbrev value can trust the server to reliably produce 4.02 Bad Option for other Uri-Path-Abbrev values.</t>
        <t>As CoAP multicast requests generally do not result in errors being returned,
tentative use is not available for multicast requests.</t>
        <t>A generic client implementation <bcp14>SHOULD NOT</bcp14> use this option
without explicit instructions from a higher layer or the known specification of the numeric value,
because conditions for tentative use are generally not met in this case.</t>
      </section>
      <section anchor="proxy-processing">
        <name>Proxy processing</name>
        <t>A proxy <bcp14>MAY</bcp14> expand into Uri-Path options, or abbreviate to a Uri-Path-Abbrev option, before consulting its cache.</t>
        <t>It <bcp14>MAY</bcp14> expand a Uri-Path-Abbrev option before forwarding,
in particular if it has reason to assume that the option is not understood by the receiver.
Like a generic client, it <bcp14>SHOULD NOT</bcp14> abbreviate without good reason;
and if it does, it <bcp14>MUST</bcp14> be able to fall back to the expanded form upon failure, as to not introduce unexpected errors to the client.</t>
        <t>A proxy that knows the Uri-Path-Abbrev option but not the concrete value at hand
<bcp14>SHOULD</bcp14> forward a request unmodified,
which is the behavior it would apply if it did not know the option.
A valid exception where the proxy can reject the request instead is when the proxy is tasked with enforcing access control
(see <xref target="seccons"/>).</t>
        <t>When cross-proxying to protocols that cannot transport this option
(such as HTTP),
the proxy needs to expand the path always.
<!-- No need to state anything about the inverse direction, as the 2nd paragraph applies. -->
        </t>
      </section>
      <section anchor="interactions">
        <name>Interaction with other options</name>
        <t>The option is mutually exclusive with the Uri-Path option.
Receiving both options in a single request, a server <bcp14>MUST</bcp14> treat the Uri-Path-Abbrev option as a critical request option that could not be processed.</t>
        <t>The Uri-Path-Abbrev option <bcp14>MUST NOT</bcp14> be used in combination with the Proxy-Uri option (or the similar Proxy-CRI option (of <xref target="I-D.ietf-core-href"/>)) by clients.</t>
        <t>When a request gets forwarded through multiple proxies,
any of them might convert the Uri-* options (but, when unaware of its significance, not Uri-Path-Abbrev) into a single Proxy-Uri/-CRI option.
This Proxy-Uri/-CRI conversion will get reverted to Uri-* options
before or at the final hop where the final hop is not proxy forwarding.
It is thus generally inconsequential to client and server that Proxy-Uri/-CRI and Uri-Path-Abbrev occur in the same message in such a case.</t>
        <t>Endpoints that process both the Proxy-Uri/-CRI and the Uri-Path-Abbrev option
(which is, servers that are not forwarding like proxies, but are regarded as proxies by other proxies),
<bcp14>MUST</bcp14> logically decompose the Proxy-* options before processing the Uri-Path-Abbrev option,
which entails an error response if both a path segment in the Proxy-* option and Uri-Path-Abbrev are present.</t>
      </section>
      <section anchor="choice-of-the-option-number">
        <name>Choice of the option number</name>
        <t><cref anchor="removeme">RFC-Editor: Please remove this section during publication.
    It is valuable only to the working group and designated experts who manage the limited resource of option numbers,
    and stays available for future documents that may want to apply similar rationale throughout the draft versions.</cref></t>
        <t>The option's desired properties (critical, safe-to-forward, part of the cache key) limit the available number space
to patterns ending with 0bXXX01 where XXX is not 111.
All options encodable with a short (1+0-byte) delta, i.e. &lt;= 12, are already assigned.
Usually, we'd then look at other options this is typically combined with,
and if there are none (as is the case here),
go for a large value in the next more efficient (1+1-byte) space
so that the small-but-quite-not-1+0-byte numbers stay usable as 1+0-byte options when combined in their "favorite pairings".
(This was done with the EDHOC option <xref target="RFC9528"/> which is usually paired with the OSCORE option <xref target="RFC8613"/>).</t>
        <t>However, in this case, there is an extra concern:
The option number should also be smaller than Uri-Query,
so that processing the options in a linear fashion
can happen as it would happen with Uri-Path:
the path gets processed first, setting up a state machine to process the query.
As Uri-Query has option number 15, the value 13 is the only good choice for the Uri-Path-Abbrev option.</t>
      </section>
    </section>
    <section anchor="initial">
      <name>Initial Uri-Path-Abbrev values</name>
      <t>This document registers values for the following well-known URIs:</t>
      <ul spacing="normal">
        <li>
          <t><tt>/.well-known/core</tt></t>
        </li>
        <li>
          <t><tt>/.well-known/rd</tt> (see <xref target="RFC9175"/>)</t>
        </li>
        <li>
          <t><tt>/.well-known/edhoc</tt> (see <xref target="RFC9528"/>)</t>
        </li>
        <li>
          <t>For EST (<xref target="RFC9148"/>):
          </t>
          <ul spacing="normal">
            <li>
              <t><tt>/.well-known/est/crts</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/est/sen</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/est/sren</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/est/skg</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/est/skc</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/est/att</tt></t>
            </li>
          </ul>
          <t>
EST does allow using other paths, such as different root resources or arbitrary labels;
for those, no abbreviations are supported in this document.</t>
        </li>
        <li>
          <t>For <xref target="I-D.ietf-anima-constrained-voucher"/>:
          </t>
          <ul spacing="normal">
            <li>
              <t><tt>/.well-known/brski/es</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/brski/rv</tt></t>
            </li>
            <li>
              <t><tt>/.well-known/brski/vs</tt></t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Note that the <tt>core</tt> and <tt>rd</tt> paths are commonly used together with Uri-Query options.</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of
this Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>.  The description of implementations in this section is
intended to assist the IETF in its decision processes in
progressing drafts to RFCs.  Please note that the listing of any
individual implementation here does not imply endorsement by the
IETF.  Furthermore, no effort has been spent to verify the
information presented here that was supplied by IETF contributors.
This is not intended as, and must not be construed to be, a
catalog of available implementations or their features.  Readers
are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working
groups to assign due consideration to documents that have the
benefit of running code, which may serve as evidence of valuable
experimentation and feedback that have made the implemented
protocols more mature.  It is up to the individual working groups
to use this information as they see fit".
<?line -20?>
      </t>
      <ul spacing="normal">
        <li>
          <t>aiocoap <eref target="https://christian.amsuess.com/tools/aiocoap/">https://christian.amsuess.com/tools/aiocoap/</eref>  </t>
          <t>
A general-purpose implementation of CoAP for unconstrained sytems,
published under MIT License.  </t>
          <t>
In its current main branch,
the implementation covers the server side of this specification,
applying expansion automatically before looking up which resource to serve.
For client, all it provides is the option field where to place a number if the application decides it is suitable,
relying on the client application to perform the fallback.  </t>
          <t>
It implements version ietf-core-uri-path-abbrev-01.
Implementation experience:
generally straightforward.  </t>
          <t>
The biggest trouble during implementation was that originally,
it was attempted to give the server application access to information on whether or not Uri-Path-Abbrev was used.
This was resolved by just not exposing the information --
after all, that is probably good layering practice anyway.  </t>
          <t>
Contact information: Christian Amsüss (author), updated 2025-09-26</t>
        </li>
        <li>
          <t>libcoap (preliminary)  </t>
          <t>
A report on a yet unpublished implementation and related tests of ietf-core-uri-path-abbrev-01 in libcoap
has been submitted at <eref target="https://github.com/core-wg/uri-path-abbrev/issues/25">https://github.com/core-wg/uri-path-abbrev/issues/25</eref> on 2025-10-01.</t>
        </li>
      </ul>
    </section>
    <section anchor="seccons">
      <name>Security Considerations</name>
      <t>Having alternative expressions for information that is input to policy decisions
can be problematic when the mechanism performing the check has a different interpretation of the presented data than the mechanism at time of use.
That concern is not new to this document:
Both the Proxy-Uri of <xref target="RFC7252"/> and the Proxy-Cri option of <xref target="I-D.ietf-core-href"/> have the same properties in that regard.
The appropriate behavior is for policy checkers to reject any request that contains critical options that are not understood;
the application protected by the checker may provide the checker with an allow-list of options that it will treat as unchecked input.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="iana-option">
        <name>CoAP option: Uri-Path-Abbrev</name>
        <t>IANA is requested to enter one option into the CoAP Option Numbers registry in the CoRE Parameters registry group:</t>
        <ul spacing="normal">
          <li>
            <t>Number: CPA13</t>
          </li>
          <li>
            <t>Name: Uri-Path-Abbrev</t>
          </li>
          <li>
            <t>Reference: this document</t>
          </li>
        </ul>
      </section>
      <section anchor="iana-reg">
        <name>Uri-Path-Abbrev registry</name>
        <t>IANA is requested to establish a new registry in the CoRE parameters registry group.
The value of the first Uri-Path-Abbrev option in a CoAP request corresponds to a URI path entry in this registry.</t>
        <t>The policy for adding any value is IETF Review (as described in <xref target="RFC8126"/>).
Change control for the registry follows this document's publication stream.
Initial values for the registry are given in <xref target="initial-table"/>.</t>
        <t>The required fields for each registration are:</t>
        <ul spacing="normal">
          <li>
            <t>Option value.  </t>
            <t>
A non-negative integer (uint) that can be expressed in 32 bits,
unique within this registry.  </t>
            <t>
All positive values whose most significant bit of the most significant non-zero byte is '1'
are reserved.  </t>
            <t>
The Python invocation
<tt>python3 -c 'print("reserved" if (250).bit_length() % 8 == 0 else "unreserved")'</tt>
can be used to quickly test this property for any positive number (250 in this example).</t>
          </li>
          <li>
            <t>Expanded path.  </t>
            <t>
This text is the URI path (starting with <tt>/</tt>) that the option
is expanded to.</t>
          </li>
          <li>
            <t>Reference.  </t>
            <t>
A document that requested the allocation.</t>
          </li>
        </ul>
        <t>Reviewer instructions:</t>
        <t>The reviewer is instructed to be frugal with the 128 values that correspond to a single-byte option value,
focusing on applications that are expected to be useful in different constrained ecosystems.</t>
        <t>The expanded path is expected to be a well-known path (<xref target="RFC8615"/>),
but it is up to the reviewers to exceptionally also admit paths that are not well-known.</t>
        <table anchor="initial-table">
          <name>Initial values for the Uri-Path-Abbrev registry</name>
          <thead>
            <tr>
              <th align="left">Option value</th>
              <th align="left">Expanded path</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">0</td>
              <td align="left">/.well-known/core</td>
              <td align="left">
                <xref target="initial"/> of this document</td>
            </tr>
            <tr>
              <td align="left">1</td>
              <td align="left">/.well-known/rd</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9176"/></td>
            </tr>
            <tr>
              <td align="left">2</td>
              <td align="left">/.well-known/edhoc</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9528"/></td>
            </tr>
            <tr>
              <td align="left">301</td>
              <td align="left">/.well-known/est/crts</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9148"/></td>
            </tr>
            <tr>
              <td align="left">302</td>
              <td align="left">/.well-known/est/sen</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9148"/></td>
            </tr>
            <tr>
              <td align="left">303</td>
              <td align="left">/.well-known/est/sren</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9148"/></td>
            </tr>
            <tr>
              <td align="left">304</td>
              <td align="left">/.well-known/est/skg</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9148"/></td>
            </tr>
            <tr>
              <td align="left">305</td>
              <td align="left">/.well-known/est/skc</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9148"/></td>
            </tr>
            <tr>
              <td align="left">306</td>
              <td align="left">/.well-known/est/att</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="RFC9148"/></td>
            </tr>
            <tr>
              <td align="left">401</td>
              <td align="left">/.well-known/brski/es</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="I-D.ietf-anima-constrained-voucher"/></td>
            </tr>
            <tr>
              <td align="left">402</td>
              <td align="left">/.well-known/brski/rv</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="I-D.ietf-anima-constrained-voucher"/></td>
            </tr>
            <tr>
              <td align="left">403</td>
              <td align="left">/.well-known/brski/vs</td>
              <td align="left">
                <xref target="initial"/> of this document, and <xref target="I-D.ietf-anima-constrained-voucher"/></td>
            </tr>
          </tbody>
        </table>
        <!-- We could also say in prose to take them from there and list the numbers there, but it is useful for later registrant to have a ready-made template in the document that sets things up. -->

</section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC7228">
          <front>
            <title>Terminology for Constrained-Node Networks</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="M. Ersue" initials="M." surname="Ersue"/>
            <author fullname="A. Keranen" initials="A." surname="Keranen"/>
            <date month="May" year="2014"/>
            <abstract>
              <t>The Internet Protocol Suite is increasingly used on small devices with severe constraints on power, memory, and processing resources, creating constrained-node networks. This document provides a number of basic terms that have been useful in the standardization work for constrained-node networks.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7228"/>
          <seriesInfo name="DOI" value="10.17487/RFC7228"/>
        </reference>
        <reference anchor="RFC6690">
          <front>
            <title>Constrained RESTful Environments (CoRE) Link Format</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <date month="August" year="2012"/>
            <abstract>
              <t>This specification defines Web Linking using a link format for use by constrained web servers to describe hosted resources, their attributes, and other relationships between links. Based on the HTTP Link Header field defined in RFC 5988, the Constrained RESTful Environments (CoRE) Link Format is carried as a payload and is assigned an Internet media type. "RESTful" refers to the Representational State Transfer (REST) architecture. A well-known URI is defined as a default entry point for requesting the links hosted by a server. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6690"/>
          <seriesInfo name="DOI" value="10.17487/RFC6690"/>
        </reference>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
        <reference anchor="RFC9148">
          <front>
            <title>EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="S. Raza" initials="S." surname="Raza"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9148"/>
          <seriesInfo name="DOI" value="10.17487/RFC9148"/>
        </reference>
        <referencegroup anchor="BCP190" target="https://www.rfc-editor.org/info/bcp190">
          <reference anchor="RFC8820" target="https://www.rfc-editor.org/info/rfc8820">
            <front>
              <title>URI Design and Ownership</title>
              <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
              <date month="June" year="2020"/>
              <abstract>
                <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of substructure in URIs is often problematic.</t>
                <t>This document provides guidance on the specification of URI substructure in standards.</t>
                <t>This document obsoletes RFC 7320 and updates RFC 3986.</t>
              </abstract>
            </front>
            <seriesInfo name="BCP" value="190"/>
            <seriesInfo name="RFC" value="8820"/>
            <seriesInfo name="DOI" value="10.17487/RFC8820"/>
          </reference>
        </referencegroup>
        <reference anchor="I-D.ietf-lake-reqs-04">
          <front>
            <title>Requirements for a Lightweight AKE for OSCORE</title>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>Inria</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Dan Garcia-Carillo" initials="D." surname="Garcia-Carillo">
              <organization>Odin Solutions S.L.</organization>
            </author>
            <date day="8" month="June" year="2020"/>
            <abstract>
              <t>   This document compiles the requirements for a lightweight
   authenticated key exchange protocol for OSCORE.  This draft has
   completed a working group last call (WGLC) in the LAKE working group.
   Post-WGLC, the requirements are considered sufficiently stable for
   the working group to proceed with its work.  It is not currently
   planned to publish this draft as an RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-reqs-04"/>
        </reference>
        <reference anchor="RFC8615">
          <front>
            <title>Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
              <t>In doing so, it obsoletes RFC 5785 and updates the URI schemes defined in RFC 7230 to reserve that space. It also updates RFC 7595 to track URI schemes that support well-known URIs in their registry.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8615"/>
          <seriesInfo name="DOI" value="10.17487/RFC8615"/>
        </reference>
        <reference anchor="I-D.bormann-cbor-draft-numbers">
          <front>
            <title>Managing CBOR codepoints in Internet-Drafts</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="12" month="January" year="2026"/>
            <abstract>
              <t>   CBOR-based protocols often make use of numbers allocated in a
   registry.  During development of the protocols, those numbers may not
   yet be available.  This impedes the generation of data models and
   examples that actually can be used by tools.

   This short draft proposes a common way to handle these situations,
   without any changes to existing tools.  Also, in conjunction with the
   application-oriented EDN literal e'', a further reduction in
   editorial processing of CBOR examples around the time of approval can
   be achieved.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-cbor-draft-numbers-07"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC9290">
          <front>
            <title>Concise Problem Details for Constrained Application Protocol (CoAP) APIs</title>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="October" year="2022"/>
            <abstract>
              <t>This document defines a concise "problem detail" as a way to carry machine-readable details of errors in a Representational State Transfer (REST) response to avoid the need to define new error response formats for REST APIs for constrained environments. The format is inspired by, but intended to be more concise than, the problem details for HTTP APIs defined in RFC 7807.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9290"/>
          <seriesInfo name="DOI" value="10.17487/RFC9290"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="21" month="November" year="2025"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) rather than as a
   sequence of characters.  This approach simplifies parsing,
   comparison, and reference resolution in environments with severe
   limitations on processing power, code size, and memory size.

   This RFC updates RFC 7595 by adding a column on the "URI Schemes"
   registry.


   // (This "cref" paragraph will be removed by the RFC editor:) After
   // approval of -28 and nit fixes in -29, the present revision -30
   // contains two more small fixes for nits that were uncovered in the
   // RPC intake process.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-30"/>
        </reference>
        <reference anchor="RFC9175">
          <front>
            <title>Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing</title>
            <author fullname="C. Amsüss" initials="C." surname="Amsüss"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non-secure reuse of Tokens to ensure response-to-request binding when CoAP is used with a security protocol, and amplification mitigation (where the use of the Echo option is now recommended).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9175"/>
          <seriesInfo name="DOI" value="10.17487/RFC9175"/>
        </reference>
        <reference anchor="I-D.ietf-anima-constrained-voucher">
          <front>
            <title>Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI)</title>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
              <organization>vanderstok consultancy</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <date day="27" month="February" year="2026"/>
            <abstract>
              <t>   This document defines the Constrained Bootstrapping Remote Secure Key
   Infrastructure (cBRSKI) protocol, which provides a solution for
   secure zero-touch onboarding of resource-constrained (IoT) devices
   into the network of a domain owner.  This protocol is designed for
   constrained networks, which may have limited data throughput or may
   experience frequent packet loss. cBRSKI is a variant of the BRSKI
   protocol, which uses an artifact signed by the device manufacturer
   called the "voucher" which enables a new device and the owner's
   network to mutually authenticate.  While the BRSKI voucher data is
   encoded in JSON, cBRSKI uses a compact CBOR-encoded voucher.  The
   BRSKI voucher data definition is extended with new data types that
   allow for smaller voucher sizes.  The Enrollment over Secure
   Transport (EST) protocol, used in BRSKI, is replaced with EST-over-
   CoAPS; and HTTPS used in BRSKI is replaced with DTLS-secured CoAP
   (CoAPS).  This document Updates RFC 8995 and RFC 9148.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-constrained-voucher-30"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC9176">
          <front>
            <title>Constrained RESTful Environments (CoRE) Resource Directory</title>
            <author fullname="C. Amsüss" initials="C." role="editor" surname="Amsüss"/>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources. Furthermore, new target attributes useful in conjunction with an RD are defined.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9176"/>
          <seriesInfo name="DOI" value="10.17487/RFC9176"/>
        </reference>
        <reference anchor="I-D.ietf-core-corr-clar-03">
          <front>
            <title>Constrained Application Protocol (CoAP): Corrections and Clarifications</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="22" month="December" year="2025"/>
            <abstract>
              <t>   RFC 7252 defines the Constrained Application Protocol (CoAP), along
   with a number of additional specifications, including RFC 7641, RFC
   7959, RFC 8132, and RFC 8323.  RFC 6690 defines the link format that
   is used in CoAP self-description documents.

   Some parts of the specification may be unclear or even contain errors
   that may lead to misinterpretations that may impair interoperability
   between different implementations.  The present document provides
   corrections, additions, and clarifications to the RFCs cited; this
   document thus updates these RFCs.  In addition, other clarifications
   related to the use of CoAP in other specifications, including RFC
   7390 and RFC 8075, are also provided.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-corr-clar-03"/>
        </reference>
        <reference anchor="RFC8132">
          <front>
            <title>PATCH and FETCH Methods for the Constrained Application Protocol (CoAP)</title>
            <author fullname="P. van der Stok" initials="P." surname="van der Stok"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="A. Sehgal" initials="A." surname="Sehgal"/>
            <date month="April" year="2017"/>
            <abstract>
              <t>The methods defined in RFC 7252 for the Constrained Application Protocol (CoAP) only allow access to a complete resource, not to parts of a resource. In case of resources with larger or complex data, or in situations where resource continuity is required, replacing or requesting the whole resource is undesirable. Several applications using CoAP need to access parts of the resources.</t>
              <t>This specification defines the new CoAP methods, FETCH, PATCH, and iPATCH, which are used to access and update parts of a resource.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8132"/>
          <seriesInfo name="DOI" value="10.17487/RFC8132"/>
        </reference>
      </references>
    </references>
    <?line 445?>

<section anchor="update7252">
      <name>RFC7252-5.4.1: Critical Options and Error Messages</name>
      <t>This appendix is normative.</t>
      <t><xref section="4.2" sectionFormat="of" target="RFC7252"/> introduces the concept of <em>rejecting</em> a
message, by sending back a RST (Reset) message or by silently
ignoring the rejected message.
This can deal with messages for which a node does not have (e.g., no
longer has) the necessary context to process it, such as a response to
a message that a node sent immediately before it rebooted.</t>
      <t>The concept of rejecting a message is a quite powerful way to limit
the complexity of dealing with a variety of error conditions.
However, it seems <xref section="5.4.1" sectionFormat="of" target="RFC7252"/> overuses this instrument
for the case of non-confirmable messages.</t>
      <t><xref section="5.4.1" sectionFormat="of" target="RFC7252"/> describes Critical Options, which, if not
implemented/understood by a node, may require the return of server
errors.
For Confirmable messages containing requests, unrecognized critical
options in requests are handled by a 4.02 (Bad Option) response, while
those in Confirmable messages with responses and Acknowledgements are
rejected.</t>
      <blockquote>
        <ul spacing="normal">
          <li>
            <t>Unrecognized options of class "critical" that occur in a
Confirmable request <bcp14>MUST</bcp14> cause the return of a 4.02 (Bad Option)
response.  This response <bcp14>SHOULD</bcp14> include a diagnostic payload
describing the unrecognized option(s) (see Section 5.5.2).</t>
          </li>
          <li>
            <t>Unrecognized options of class "critical" that occur in a
Confirmable response, or piggybacked in an Acknowledgement, <bcp14>MUST</bcp14>
cause the response to be rejected (Section 4.2).</t>
          </li>
        </ul>
      </blockquote>
      <t>The 4.02 error response enables clients to perform discovery of
whether a critical option is recognized by a server, but surprisingly
only for Confirmable messages.</t>
      <t>For unknown reasons, <xref section="5.4.1" sectionFormat="of" target="RFC7252"/> then goes on to handle
all Non-confirmable messages with unrecognized critical options by
rejecting them:</t>
      <blockquote>
        <ul spacing="normal">
          <li>
            <t>Unrecognized options of class "critical" that occur in a
Non-confirmable message <bcp14>MUST</bcp14> cause the message to be rejected
(Section 4.3).</t>
          </li>
        </ul>
      </blockquote>
      <t>This deprives the sender of a Non-confirmable request of the
information what caused the rejection.
However, using Non-confirmable messages does not automatically mean
that the recipient does not have the context needed to process the
message.</t>
      <t>This unexplained inconsistency has been present in <xref target="RFC7252"/> since its
initial publication, apparently without causing much trouble.
Section <xref target="clientprocessing"/> of this document describes a situation where discovery of
option support is more central to at least one use case; not being
able to properly perform this discovery for Non-confirmable messages now
emerges as an actual defect.</t>
      <t>This defect can be remedied by applying this change:</t>
      <dl>
        <dt>INCORRECT:</dt>
        <dd>
          <blockquote>
            <ul spacing="normal">
              <li>
                <t>Unrecognized options of class "critical" that occur in a Non-
confirmable message <bcp14>MUST</bcp14> cause the message to be rejected
(Section 4.3).</t>
              </li>
            </ul>
          </blockquote>
        </dd>
        <dt>CORRECTED:</dt>
        <dd>
          <blockquote>
            <ul spacing="normal">
              <li>
                <t>Unrecognized options of class "critical" that occur in a
Non-confirmable request <bcp14>SHOULD</bcp14> cause the return of a 4.02 (Bad Option)
response.  This response <bcp14>SHOULD</bcp14> include a diagnostic payload
describing the unrecognized option(s) (see Section 5.5.2).</t>
              </li>
              <li>
                <t>Unrecognized options of class "critical" that occur in a
Non-confirmable response, or piggybacked in an Acknowledgement, <bcp14>MUST</bcp14>
cause the response to be rejected (Section 4.3).</t>
              </li>
            </ul>
          </blockquote>
        </dd>
      </dl>
      <t>(This replacement text could be integrated in a less redundant way;
the present proposal primarily aims at clarity.)</t>
      <t>Of course, existing implementations will not immediately change their
behavior, so an implementation of a discovery process in this document
will still need to deal with uncertainty for the foreseeable future,
but the likelihood will reduce over time.
Client implementations that are not updated and actually rely on not
receiving an error response in this case will simply reject the
message, causing little downside.</t>
      <t>Note that the <bcp14>SHOULD</bcp14> about diagnostic payloads is repeated here; such
a mandate usually needs to provide more information about when this
interoperability requirement does not need to be met.
<xref target="RFC9290"/> now in many cases provides a better way to respond than a
diagnostic payload; for conciseness, this observation is not included
in the normative replacement text proposed above.</t>
      <t>[ The following section to be removed by the RFC editor. ]</t>
      <t>This technical change was originally developed as <xref section="2.2" sectionFormat="of" target="I-D.ietf-core-corr-clar-03"/>,
and moved into this document for publication,
so that it can be used for simplifications in describing tentative use,
where the text would otherwise have had to reaffirm the original behavior.</t>
    </section>
    <section anchor="further-development">
      <name>Further development</name>
      <t>This appendix is for information only.</t>
      <t>Several possible further directions are anticipated in this document,
but not specified at this point in time;
they are left for further documents that update and thus compatibly extend this document.</t>
      <t>In any case, server implementations that treat unknown option values or repeated Uri-Path-Abbrev options
like any other critical unprocessable option (i.e., by responding with 4.02 Bad Option)
support the transition to such an extension.
<!-- It'd be great to state "this is already required in 7252", but it only implies that and doesn't make it explicit. -->
      </t>
      <ul spacing="normal">
        <li>
          <t>Some values of the option might admit repetition of the option.
A document that updates this document and the Uri-Path-Abbrev registry will need to specify
how later occurrences of the option
extend the series of equivalent Uri-Path options from the first value,
or defer some of that decision to that first value's entry.</t>
        </li>
        <li>
          <t>The mechanism of expanding one option into another option
might be expressed using the terminology of SCHC.  </t>
          <t>
Such a generalization is not aimed for in this document;
authors of any future document providing such a framework
are encouraged to provide an equivalent but machine-readable explanation of the mechanism specified here.</t>
        </li>
        <li>
          <t>The registry for Uri-Path-Abbrev values is set up such that first values can not have the most significant bit of the first byte set.  </t>
          <t>
This allows future documents to reuse the option for CBOR data items,
e.g. the path component of a CRI <xref target="I-D.ietf-core-href"/>.
Note that those CBOR data items can only use the major types 4 to 7 for the top-level item,
but that includes all containers (arrays, maps and tags).  </t>
          <t>
Senders and recipients of this option do not need to concern themselves with that extension mechanism
unless they implement it:
As the first value is compared to known registry entries,
any CBOR item contained in it will simply not match any known value.
Should the working group decide not to use that extension point,
the registry's policy can be relaxed to also allow values with that leading bit set.</t>
        </li>
        <li>
          <t>A future document may update this document
to allow registering values that are allowed to use together with Uri-Path values
(but at the time of writing, no examples are known by which such a design could be properly vetted).
In particular, that update weakens the "<bcp14>MUST</bcp14>" in <xref target="interactions"/>.</t>
        </li>
        <li>
          <t>This option is designed to stand in for the Uri-Path option alone,
not for any other option;
this simplifies its interaction rules.  </t>
          <t>
In particular,
application authors who seek to express Uri-Query options in a more concise or easier to process way
are advised to avail themselves of the FETCH method introduced in <xref target="RFC8132"/>.</t>
        </li>
      </ul>
    </section>
    <section removeInRFC="true" anchor="change-log">
      <name>Change log</name>
      <t>Since ietf-core-uri-path-abbrev-03:</t>
      <ul spacing="normal">
        <li>
          <t>Applied simplifications in handling of Proxy-Uri in combination of -03 more consistently:
          </t>
          <ul spacing="normal">
            <li>
              <t>Removed mandate that proxies that recognize Uri-Path-Abbrev perform conversion to Proxy-Uri expand it if known
(they may still do that per more generic rules, but given that a later proxy would undo the Proxy-Uri packing, there's no strong reason to, and it might hinder performance at a constrained server).</t>
            </li>
            <li>
              <t>Limited requirements of processing a Proxy-Uri together with Uri-Path-Abbrev to those endpoints that are actually in a position where they need to do it:
those that process both options.
That requirement was previously a <bcp14>SHOULD</bcp14> (made sense in -02 when it'd have been done by any server just to cater for the odd proxy)
and became a <bcp14>MUST</bcp14> (now that it's only actionable for implementations that actually it).</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Editorial fixes</t>
        </li>
      </ul>
      <t>Since ietf-core-uri-path-abbrev-02:</t>
      <ul spacing="normal">
        <li>
          <t>Added normative appendix fixing an oversight in RFC7252 (moving in from corr-clar). This allows limiting the handling of exotic cases in tentative use.</t>
        </li>
        <li>
          <t>Named Uri-Path-Abbrev as the unprocessed option when it occurs together with Uri-Path.</t>
        </li>
        <li>
          <t>Processing a mixed Proxy-Uri / Uri-Path-Abbrev is now an error if a path component is present in the former. Text was changed to indicate more strongly that seeing a Proxy-Uri and Uri-Path-Abbrev together is an exotic case even when there is no conflict.</t>
        </li>
        <li>
          <t>Formal definitions of abbreviate/expand.</t>
        </li>
        <li>
          <t>Editorial enhancements.</t>
        </li>
      </ul>
      <t>Since ietf-core-uri-path-abbrev-01: Processing WGA review input and cleanup.</t>
      <ul spacing="normal">
        <li>
          <t>Using Uri-Path-Abbrev without knowing it will be supported now has a term ("tentative use") and was reworded.</t>
        </li>
        <li>
          <t>The "<bcp14>SHOULD</bcp14>" to support fallback mode was lifted to "<bcp14>SHOULD</bcp14> only be [used when the server is known to support it]",
with the recovery being a factual necessity for reliability in tentative use.</t>
        </li>
        <li>
          <t>The fallback detection was extended to account for possible reactions to NONs (namely, RST, not replying at all, and 5.02).</t>
        </li>
        <li>
          <t>Use with multicast was limited to non-tentative use.</t>
        </li>
        <li>
          <t>Added reference to libcoap work.</t>
        </li>
        <li>
          <t>Added pointer to RFC9290 (Problem Details) error messages, discouraging diagnostic payloads.</t>
        </li>
        <li>
          <t>Sections on future work were unified in the appendix.</t>
        </li>
        <li>
          <t>Appendix on open questions was moved into the issue tracker at <eref target="https://github.com/core-wg/uri-path-abbrev/issues/">https://github.com/core-wg/uri-path-abbrev/issues/</eref>.</t>
        </li>
        <li>
          <t>Cleanup of IANA considerations where -01 previous changes were not accounted for.</t>
        </li>
        <li>
          <t>"Choice of option number" spelled out and set up for removal before publication.</t>
        </li>
        <li>
          <t>Editorial changes.</t>
        </li>
      </ul>
      <t>Since ietf-core-uri-path-abbrev-00: Processing previous two interims.</t>
      <ul spacing="normal">
        <li>
          <t>Rename option to Uri-Path-Abbrev.</t>
        </li>
        <li>
          <t>Allocate per-resource codes for EST and cBRSKI.</t>
        </li>
        <li>
          <t>Allocate code for EDHOC.</t>
        </li>
        <li>
          <t>Defer repeated use to future extensions.</t>
        </li>
        <li>
          <t>Rearrange content to have dedicated server, client and proxy subsections for option processing.</t>
        </li>
        <li>
          <t>Establish that generic clients <bcp14>SHOULD NOT</bcp14> use this without reason.</t>
        </li>
        <li>
          <t>More explicit language for proxies, including cross-proxies.</t>
        </li>
        <li>
          <t>Add introduction and motivating example.</t>
        </li>
        <li>
          <t>Add RFC7942 Implementation Status section.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-core-shopinc-02:</t>
      <t>Adopted into WG unmodified as I-D.ietf-core-uri-path-abbrev</t>
      <t>Since draft-amsuess-core-shopinc-01: Processing 2025-08-27 interim.</t>
      <ul spacing="normal">
        <li>
          <t>Document is standards track.</t>
        </li>
        <li>
          <t>Change name of the option from Short-Uri-Path to Uri-Path-Abbr.</t>
        </li>
        <li>
          <t>Close question of whether use of option 13 is justified (it is).</t>
        </li>
        <li>
          <t>Minor editorials.</t>
        </li>
      </ul>
      <t>Since draft-amsuess-core-shopinc-00:</t>
      <ul spacing="normal">
        <li>
          <t>Switched option type from opaque to uint (retaining the lockout for values that look like CBOR arrays/maps).</t>
        </li>
        <li>
          <t>MCR joined as author.</t>
        </li>
        <li>
          <t>Added initial values for BRSKI and EST.</t>
        </li>
        <li>
          <t>Allow 4.04 responses.</t>
        </li>
        <li>
          <t>Add guidance for choosing prefixes and rules.</t>
        </li>
        <li>
          <t>Large editorial changes.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>Discussion with Eski Dijk led to the creation of the document,
he questioned choices until the design was simple enough, and also provided editorial input.
Carsten Bormann provided <xref target="update7252"/>, as well as useful input on shaping the registry.
Jon Shallow provided much input, in particular around gaps in the fallback process.</t>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="C." surname="Bormann" fullname="Carsten Bormann">
        <organization>Universität Bremen TZI</organization>
        <address>
          <postal>
            <street>Postfach 330440</street>
            <city>Bremen</city>
            <code>D-28359</code>
            <country>Germany</country>
          </postal>
          <phone>+49-421-218-63921</phone>
          <email>cabo@tzi.org</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
