<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tiloca-schc-8824-update-01" category="std" consensus="true" submissionType="IETF" updates="8824" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.1 -->
  <front>
    <title abbrev="Updates on using SCHC for CoAP">Clarifications and Updates on using Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
    <seriesInfo name="Internet-Draft" value="draft-tiloca-schc-8824-update-01"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>16440</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="L." surname="Toutain" fullname="Laurent Toutain">
      <organization>IMT Atlantique</organization>
      <address>
        <postal>
          <street>CS 17607, 2 rue de la Chataigneraie</street>
          <city>Cesson-Sevigne Cedex</city>
          <code>35576</code>
          <country>France</country>
        </postal>
        <email>Laurent.Toutain@imt-atlantique.fr</email>
      </address>
    </author>
    <author initials="I." surname="Martinez" fullname="Ivan Martinez">
      <organization>Nokia Bell Labs</organization>
      <address>
        <postal>
          <street>12 Rue Jean Bart</street>
          <city>Massy</city>
          <code>91300</code>
          <country>France</country>
        </postal>
        <email>ivan.martinez_bolivar@nokia-bell-labs.com</email>
      </address>
    </author>
    <author initials="A." surname="Minaburo" fullname="Ana Minaburo">
      <organization>Consultant</organization>
      <address>
        <postal>
          <street>Rue de Rennes</street>
          <city>Cesson-Sevigne</city>
          <code>35510</code>
          <country>France</country>
        </postal>
        <email>anaminaburo@gmail.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="10"/>
    <area>Internet</area>
    <workgroup>SCHC Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document clarifies, updates and extends the method specified in RFC 8824 for compressing Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. In particular, it considers recently defined CoAP options and specifies how CoAP headers are compressed in the presence of intermediaries. Therefore, this document updates RFC 8824.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Static Context Header Compression Working Group mailing list (schc@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/schc/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://gitlab.com/crimson84/draft-tiloca-schc-8824-update"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="intro">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> is a web-transfer protocol intended for applications based on the REST (Representational State Transfer) paradigm, and designed to be affordable also for resource-constrained devices.</t>
      <t>In order to enable the use of CoAP in LPWANs (Low-Power Wide-Area Networks) as well as to improve performance, <xref target="RFC8824"/> defines how to use the Static Context Header Compression and fragmentation (SCHC) framework <xref target="RFC8724"/> for compressing CoAP headers.</t>
      <t>This document clarifies, updates and extends the SCHC compression of CoAP headers defined in <xref target="RFC8824"/> at the application level, by: providing specific clarifications; updating specific details of the compression processing, based on recent developments related to the security protocol OSCORE <xref target="RFC8613"/> for end-to-end protection of CoAP messages; and extending the compression processing to take into account additional CoAP options and the presence of CoAP proxies.</t>
      <t>In particular, this document updates <xref target="RFC8824"/> as follows.</t>
      <ul spacing="normal">
        <li>It clarifies the SCHC compression for the CoAP options Size1, Size2, Proxy-Uri and Proxy-Scheme (see <xref target="coap-options-updated-set"/>).</li>
        <li>It defines the SCHC compression for the CoAP option Hop-Limit (see <xref target="coap-options-hop-limit"/>).</li>
        <li>It defines the SCHC compression for the recently defined CoAP options Echo (see <xref target="coap-options-echo"/>), Request-Tag (see <xref target="coap-options-request-tag"/>), EDHOC (see <xref target="coap-options-edhoc"/>), as well as Q-Block1 and Q-Block2 (see <xref target="coap-extensions-block"/>).</li>
        <li>It updates the SCHC compression processing for the CoAP option OSCORE (see <xref target="coap-extensions-oscore"/>), in the light of recent developments related to the security protocol OSCORE as defined in <xref target="I-D.ietf-core-oscore-key-update"/> and <xref target="I-D.ietf-core-oscore-groupcomm"/>.</li>
        <li>It clarifies how the SCHC compression handles the CoAP payload marker (see <xref target="payload-marker"/>).</li>
        <li>It defines the SCHC compression of CoAP headers in the presence of CoAP proxies (see <xref target="compression-with-proxies"/>).</li>
      </ul>
      <t>This document does not alter the core approach, design choices and features of the SCHC compression applied to CoAP headers.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
        <t>Readers are expected to be familiar with the terms and concepts related to the SCHC framework <xref target="RFC8724"/>, the web-transfer protocol CoAP <xref target="RFC7252"/>, the security protocol OSCORE <xref target="RFC8613"/> and the use of SCHC for CoAP <xref target="RFC8824"/>.</t>
      </section>
    </section>
    <section anchor="coap-options">
      <name>CoAP Options</name>
      <t>This section updates and extends <xref section="5" sectionFormat="of" target="RFC8824"/>, as to how SCHC compresses some specific CoAP options. In particular, <xref target="coap-options-updated-set"/> updates <xref section="5.4" sectionFormat="of" target="RFC8824"/>.</t>
      <section anchor="coap-options-updated-set">
        <name>CoAP Option Size1, Size2, Proxy-Uri, and Proxy-Scheme Fields</name>
        <t>The SCHC Rule description MAY define sending some field values by not setting the TV, while setting the MO to "ignore" and the CDA to "value-sent". A Rule MAY also use a "match-mapping" MO when there are different options for the same FID. Otherwise, the Rule sets the TV to the value, the MO to "equal", and the CDA to "not-sent".</t>
      </section>
      <section anchor="coap-options-hop-limit">
        <name>CoAP Option Hop-Limit Field</name>
        <t>The Hop-Limit field is an option defined in <xref target="RFC8768"/> that can be used to detect forwarding loops through a chain of CoAP proxies. The first proxy in the chain that understands the option includes it in a received request with a proper value set, before forwarding the request. Any following proxy that understands the option decrements the option value and forwards the request if the new value is different than zero, or returns a 5.08 (Hop Limit Reached) error response otherwise.</t>
        <t>When a packet uses the Hop-Limit option, SCHC compression SHOULD send its content in the Compression Residue. That is, in the SCHC Rule, the TV is not set, while the MO is set to "ignore", and the CDA is set to "value-sent". As an exception, and consistently with the default value 16 defined for the Hop-Limit option in <xref section="3" sectionFormat="of" target="RFC8768"/>, a Rule MAY describe a TV with value 16, with the MO set to "equal" and the CDA set to "not-sent".</t>
      </section>
      <section anchor="coap-options-echo">
        <name>CoAP Option Echo Field</name>
        <t>The Echo field is an option defined in <xref target="RFC9175"/> that a server can include in a response as a challenge to the client, and that the client echoes back to the server in one or more requests. This enables the server to verify the freshness of a request and to cryptographically verify the aliveness of the client. Also, it forces the client to demonstrate reachability at its claimed network address.</t>
        <t>When a packet uses the Echo option, SCHC compression SHOULD send its content in the Compression Residue. That is, in the SCHC Rule, the TV is not set, while the MO is set to "ignore", and the CDA is set to "value-sent". An exception applies in case the server generates the values to use for the Echo option by means of a persistent counter (see <xref section="A" sectionFormat="of" target="RFC9175"/>). In such a case, a Rule MAY use the "MSB" MO and the "LSB" CDA. This would be effectively applicable until the persistent counter at the server becomes greater than the maximum threshold value that produces an MSB-matching.</t>
      </section>
      <section anchor="coap-options-request-tag">
        <name>CoAP Option Request-Tag Field</name>
        <t>The Request-Tag field is an option defined in <xref target="RFC9175"/> that the client can set in request messages of block-wise operations, with value an ephemeral short-lived identifier of the specific block-wise operation in question. This allows the server to match message fragments belonging to the same request operation and, if the server supports it, to reliably process simultaneous block-wise request operations on a single resource. If requests are integrity protected, this also protects against interchange of fragments between different block-wise request operations.</t>
        <t>When a packet uses the Request-Tag option, SCHC compression MAY send its content in the Compression Residue. That is, in the SCHC Rule, the TV is not set, while the MO is set to "ignore", and the CDA is set to "value-sent". Alternatively, if a pre-defined set of Request-Tag values used by the client is known, a Rule MAY use a "match-mapping" MO when there are different options for the same FID.</t>
      </section>
      <section anchor="coap-options-edhoc">
        <name>CoAP Option EDHOC Field</name>
        <t>The EDHOC field is an option defined in <xref target="I-D.ietf-core-oscore-edhoc"/> that a client can include in a request, in order to perform an optimized, shortened execution of the authenticated key establishment protocol EDHOC <xref target="I-D.ietf-lake-edhoc"/>. Such a request conveys both the final EDHOC message and actual application data, where the latter is protected with OSCORE <xref target="RFC8613"/> using a Security Context derived from the result of the current EDHOC execution.</t>
        <t>The option occurs at most once and is always empty. The SCHC Rule MUST describe an empty TV, with the MO set to "equal" and the CDA set to "not-sent".</t>
      </section>
    </section>
    <section anchor="coap-extensions">
      <name>SCHC Compression of CoAP Extensions</name>
      <t>This section updates and extends <xref section="6" sectionFormat="of" target="RFC8824"/>, as to how SCHC compresses some specific CoAP options providing protocol extensions. In particular, <xref target="coap-extensions-block"/> updates <xref section="6.1" sectionFormat="of" target="RFC8824"/>, while <xref target="coap-extensions-oscore"/> updates <xref section="6.4" sectionFormat="of" target="RFC8824"/>.</t>
      <section anchor="coap-extensions-block">
        <name>Block</name>
        <t>When a packet uses a Block1 or Block2 option <xref target="RFC7959"/> or a Q-Block1 or Q-Block2 option <xref target="RFC9177"/>, SCHC compression MUST send its content in the Compression Residue. In the SCHC Rule, the TV is not set, while the MO is set to "ignore" and the CDA is set to "value-sent". The Block1, Block2, Q-Block1 and Q-Block2 options allow fragmentation at the CoAP level that is compatible with SCHC fragmentation. Both fragmentation mechanisms are complementary, and the node may use them for the same packet as needed.</t>
      </section>
      <section anchor="coap-extensions-oscore">
        <name>OSCORE</name>
        <t>The security protocol OSCORE <xref target="RFC8613"/> provides end-to-end protection for CoAP messages. Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> builds on OSCORE and defines end-to-end protection of CoAP messages in group communication <xref target="I-D.ietf-core-groupcomm-bis"/>. This section describes how SCHC Rules can be applied to compress messages protected with OSCORE or Group OSCORE.</t>
        <t><xref target="fig-oscore-option"/> shows the OSCORE option value encoding, which was originally defined in <xref section="6.1" sectionFormat="of" target="RFC8613"/> and has been extended in <xref target="I-D.ietf-core-oscore-key-update"/><xref target="I-D.ietf-core-oscore-groupcomm"/>. The first byte of the OSCORE option value specifies the content of the OSCORE option using flags, as follows.</t>
        <ul spacing="normal">
          <li>As defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-core-oscore-key-update"/>, the eight least significant bit, when set, indicates that the OSCORE option includes a second byte of flags. The seventh least significant bit is currently unassigned.</li>
          <li>As defined in <xref section="5" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>, the sixth least significant bit, when set, indicates that the message including the OSCORE option is protected with the group mode of Group OSCORE (see <xref section="8" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>). When not set, the bit indicates that the message is protected either with OSCORE, or with the pairwise mode of Group OSCORE (see <xref section="9" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>), while the specific OSCORE Security Context used to protect the message determines which of the two cases applies.</li>
          <li>As defined in <xref section="6.1" sectionFormat="of" target="RFC8613"/>, bit h, when set, indicates the presence of the kid context field in the option. Also, bit k, when set, indicates the presence of a kid field. Finally, the three least significant bits form the field n, which indicates the length of the piv (Partial Initialization Vector) field in bytes. When n = 0, no piv is present.</li>
        </ul>
        <t>Assuming the presence of a single flag byte, this is followed by the piv field, the kid context field, and the kid field, in that order. Also, if present, the kid context field's length (in bytes) is encoded in the first byte, denoted by "s".</t>
        <figure anchor="fig-oscore-option">
          <name>OSCORE Option</name>
          <artwork align="center"><![CDATA[
 0 1 2 3 4 5 6 7 <--------- n bytes ------------->
+-+-+-+-+-+-+-+-+---------------------------------+
|0 0 0|h|k|  n  |        Partial IV (if any)      |
+-+-+-+-+-+-+-+-+---------------------------------+
|               |                                 |
|<--   CoAP  -->|<------- CoAP OSCORE_piv ------> |
   OSCORE_flags

 <-- 1 byte --> <------ s bytes ----->
+--------------+----------------------+-----------------------+
|  s (if any)  | kid context (if any) | kid (if any)      ... |
+--------------+----------------------+-----------------------+
|                                     |                       |
|<-------- CoAP OSCORE_kidctx ------->|<-- CoAP OSCORE_kid -->|
]]></artwork>
        </figure>
        <t><xref target="fig-oscore-option-kudos"/> shows the OSCORE option value encoding, with the second byte of flags also present. As defined in <xref section="4.1" sectionFormat="of" target="I-D.ietf-core-oscore-key-update"/>, the least significant bit d of this byte, when set, indicates that two additional fields are included in the option, following the kid context field (if any).</t>
        <t>These two fields, namely x and nonce, are used when running the key update protocol KUDOS defined in <xref target="I-D.ietf-core-oscore-key-update"/>, with x specifying the length of the nonce field in bytes as well as the specific behavior to adopt during the KUDOS execution. In particular, the figure provides the breakdown of the x field, where its three least significant bits form the sub-field m, which specifies the size of nonce in bytes, minus 1.</t>
        <figure anchor="fig-oscore-option-kudos">
          <name>OSCORE Option during a KUDOS execution</name>
          <artwork align="center"><![CDATA[
 0 1 2 3 4 5 6 7  8   9   10  11  12  13  14  15 <----- n bytes ----->
+-+-+-+-+-+-+-+-+---+---+---+---+---+---+---+---+---------------------+
|1|0|0|h|k|  n  | 0 | 0 | 0 | 0 | 0 | 0 | 0 | d | Partial IV (if any) |
+-+-+-+-+-+-+-+-+---+---+---+---+---+---+---+---+---------------------+
|                                               |                     |
|<------------------- CoAP -------------------->|<- CoAP OSCORE_piv ->|
                   OSCORE_flags

 <- 1 byte -> <----------- s bytes ------------> <------ 1 byte ----->
+------------+----------------------------------+---------------------+
| s (if any) |       kid context (if any)       |     x (if any)      |
+------------+----------------------------------+---------------------+
|                                               |                     |
|<------------- CoAP OSCORE_kidctx ------------>|<-- CoAP OSCORE_x -->|
                                                |                     |
                                                |   0 1 2 3 4 5 6 7   |
                                                |  +-+-+-+-+-+-+-+-+  |
                                                |  |0|0|b|p|   m   |  |
                                                |  +-+-+-+-+-+-+-+-+  |

 <----- m + 1 bytes ----->
+-------------------------+-----------------------+
|      nonce (if any)     |    kid (if any) ...   |
+-------------------------+-----------------------+
|                         |                       |
|<-- CoAP OSCORE_nonce -->|<-- CoAP OSCORE_kid -->|
]]></artwork>
        </figure>
        <t>To better perform OSCORE SCHC compression, the Rule description needs to identify the OSCORE option and the fields it contains. Conceptually, it discerns up to six distinct pieces of information within the OSCORE option: the flag bits, the piv, the kid context, the x byte, the nonce, and the kid. The SCHC Rule splits the OSCORE option into six Field Descriptors in order to compress them:</t>
        <ul spacing="normal">
          <li>CoAP OSCORE_flags</li>
          <li>CoAP OSCORE_piv</li>
          <li>CoAP OSCORE_kidctx</li>
          <li>CoAP OSCORE_x</li>
          <li>CoAP OSCORE_nonce</li>
          <li>CoAP OSCORE_kid</li>
        </ul>
        <t><xref target="fig-oscore-option"/> shows the OSCORE option format with the four fields OSCORE_flags, OSCORE_piv, OSCORE_kidctx and OSCORE_kid superimposed on it. Also, <xref target="fig-oscore-option-kudos"/> shows the OSCORE option format with all the six fields superimposed on it, with reference to a message exchanged during an execution of the KUDOS key update protocol.</t>
        <t>In both cases, the CoAP OSCORE_kidctx field directly includes the size octet, s. In the latter case, the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>For the x field, if both endpoints know the value, then the SCHC Rule will describe a TV to this value, with the MO set to "equal" and the CDA set to "not-sent". This models the case where the two endpoints run KUDOS with a pre-agreed size of the nonce field, as well as with a pre-agreed combination of its modes of operations, as per the bits b and p of the m sub-field.  </t>
            <t>
Otherwise, if the value is changing over time, the SCHC Rule will set the MO to "ignore" and the CDA to "value-sent". The Rule may also use a "match-mapping" MO to compress this field, in case the two endpoints pre-agree on a set of alternative ways to run KUDOS, with respect to the size of the nonce field and the combination of the KUDOS modes of operation to use.</t>
          </li>
          <li>
            <t>For the nonce field, the SCHC Rule has the TV not set, while the MO is set to "ignore" and the CDA is set to "value-sent".  </t>
            <t>
In addition, for the value of the nonce field, SCHC MUST NOT send it as variable-length data in the Compression Residue, to avoid ambiguity with the length of the nonce field encoded in the x field. Therefore, SCHC MUST use the m sub-field of the x field to define the size of the Compression Residue. SCHC designates a specific function, "osc.x.m", that the Rule MUST use to complete the Field Descriptor. During the decompression, this function returns the length of the nonce field in bytes, as the value of the three least significant bits of the m sub-field of the x field, plus 1.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="payload-marker">
      <name>Compression of the CoAP Payload Marker</name>
      <t>As originally intended in <xref target="RFC8824"/>, the following applies with respect to the 0xFF payload marker. A SCHC compression Rule for CoAP includes all the expected CoAP options, therefore the payload marker does not have to be specified.</t>
      <section anchor="payload-marker-without-e2e">
        <name>Without End-to-End Security</name>
        <t>If the CoAP message to compress with SCHC is not going to be protected with OSCORE and includes a payload, then the 0xFF payload marker MUST NOT be included in the compressed message, which is composed of the Compression RuleID, the Compression Residue (if any), and the CoAP payload.</t>
        <t>After having decompressed an incoming message, the recipient endpoint MUST prepend the 0xFF payload marker to the CoAP payload, if any was present after the consumed Compression Residue.</t>
      </section>
      <section anchor="with-end-to-end-security">
        <name>With End-to-End Security</name>
        <t>If the CoAP message has to be protected with OSCORE, the same rationale described in <xref target="payload-marker-without-e2e"/> applies to both the Inner SCHC Compression and the Outer SCHC Compression defined in <xref section="7.2" sectionFormat="of" target="RFC8824"/>. That is:</t>
        <ul spacing="normal">
          <li>After the Inner SCHC Compression of a CoAP message including a payload, the payload marker MUST NOT be included in the input to the AEAD Encryption, which is composed of the Inner Compression RuleID, the Inner Compression Residue (if any), and the CoAP payload.</li>
          <li>The Outer SCHC Compression takes as input the OSCORE-protected message, which always includes a payload (i.e., the OSCORE Ciphertext) preceded by the payload marker.</li>
          <li>After the Outer SCHC Compression, the payload marker MUST NOT be included in the final compressed message, which is composed of the Outer Compression RuleID, the Outer Compression Residue (if any), and the OSCORE Ciphertext.</li>
        </ul>
        <t>After having completed the Outer SCHC Decompression of an incoming message, the recipient endpoint MUST prepend the 0xFF payload marker to the OSCORE Ciphertext.</t>
        <t>After having completed the Inner SCHC Decompression of an incoming message, the recipient endpoint MUST prepend the 0xFF payload marker to the CoAP payload, if any was present after the consumed Compression Residue.</t>
      </section>
    </section>
    <section anchor="compression-with-proxies">
      <name>CoAP Header Compression with Proxies</name>
      <t>Building on <xref target="RFC8824"/>, this section clarifies how SCHC Compression/Decompression is performed when CoAP proxies are deployed. The following refers to the origin client and origin server as application endpoints.</t>
      <t>Note that SCHC Compression/Decompression of CoAP headers is not necessarily used between each pair of hops in the communication chain. For example, if a proxy is deployed between an origin client and an origin server, SCHC might be used on the communication leg between the origin client and the proxy, but not on the communication leg between the proxy and the origin server.</t>
      <section anchor="compression-with-proxies-without-oscore">
        <name>Without End-to-End Security</name>
        <t>In case OSCORE is not used end-to-end between client and server, the SCHC processing occurs hop-by-hop, by relying on SCHC Rules that are consistently shared between two adjacent hops.</t>
        <t>In particular, SCHC is used as defined below.</t>
        <ul spacing="normal">
          <li>The sender application endpoint compresses the CoAP message, by using the SCHC Rules that it shares with the next hop towards the recipient application endpoint. The resulting, compressed message is sent to the next hop towards the recipient application endpoint.</li>
          <li>
            <t>Each proxy decompresses the incoming compressed message, by using the SCHC Rules that it shares with the (previous hop towards the) sender application endpoint.  </t>
            <t>
Then, the proxy compresses the CoAP message to be forwarded, by using the SCHC Rules that it shares with the (next hop towards the) recipient application endpoint.  </t>
            <t>
The resulting, compressed message is sent to the (next hop towards the) recipient application endpoint.</t>
          </li>
          <li>The recipient application endpoint decompresses the incoming compressed message, by using the SCHC Rules that it shares with the previous hop towards the sender application endpoint.</li>
        </ul>
      </section>
      <section anchor="compression-with-proxies-with-oscore">
        <name>With End-to-End Security</name>
        <t>In case OSCORE is used end-to-end between client and server (see <xref section="7.2" sectionFormat="of" target="RFC8824"/>), the following applies.</t>
        <t>The SCHC processing occurs end-to-end as to the Inner SCHC Compression/Decompression, by relying on Inner SCHC Rules that are consistently shared between the two application endpoints acting as OSCORE endpoints and sharing the used OSCORE Security Context.</t>
        <t>Instead, the SCHC processing occurs hop-by-hop as to the Outer SCHC Compression/Decompression, by relying on Outer SCHC Rules that are consistently shared between two adjacent hops.</t>
        <t>In particular, SCHC is used as defined below.</t>
        <ul spacing="normal">
          <li>
            <t>The sender application endpoint performs the Inner SCHC Compression on the original CoAP message, by using the Inner SCHC Rules that it shares with the recipient application endpoint.  </t>
            <t>
Following the AEAD Encryption of the compressed input obtained from the previous step, the sender application endpoint performs the Outer SCHC Compression on the resulting OSCORE-protected message, by using the Outer SCHC Rules that it shares with the next hop towards the recipient application endpoint.  </t>
            <t>
The resulting, compressed message is sent to the next hop towards the recipient application endpoint.</t>
          </li>
          <li>
            <t>Each proxy performs the Outer SCHC Decompression on the incoming compressed message, by using the SCHC Rules that it shares with the (previous hop towards the) sender application endpoint.  </t>
            <t>
Then, the proxy performs the Outer SCHC Compression of the OSCORE-protected message to be forwarded, by using the SCHC Rules that it shares with the (next hop towards the) recipient application endpoint.  </t>
            <t>
The resulting, compressed message is sent to the (next hop towards the) recipient application endpoint.</t>
          </li>
          <li>
            <t>The recipient application endpoint performs the Outer SCHC Decompression on the incoming compressed message, by using the Outer SCHC Rules that it shares with the previous hop towards the sender application endpoint.  </t>
            <t>
Then, the recipient application endpoint performs the AEAD Decryption of the OSCORE-protected message obtained from the previous step.  </t>
            <t>
Finally, the recipient application endpoint performs the Inner SCHC Decompression on the compressed input obtained from the previous step, by using the Inner SCHC Rules that it shares with the sender application endpoint. The result is the original CoAP message produced by the sender application endpoint.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="examples">
      <name>Examples of CoAP Header Compression with Proxies</name>
      <t>This section provides examples of SCHC Compression/Decompression in the presence of a CoAP proxy.</t>
      <t>The presented examples refer to the same deployment considered in <xref section="2" sectionFormat="of" target="RFC8824"/>, including a Device communicating over LPWAN with a Network Gateway (NGW), which in turn communicates with an Application Server over the Internet. The Application Server and the Device exchange CoAP messages through the NGW.</t>
      <t>In addition, the following also applies in the presented examples.</t>
      <ul spacing="normal">
        <li>CoAP request messages are sent only by the Device as targeting the Application Server (uplink traffic), which replies to the Device with corresponding CoAP response messages (downlink traffic). That is, the Device acts as CoAP client, while the Application Server acts as CoAP server.</li>
        <li>A CoAP proxy is co-located on the Network Gateway (NGW) deployed between the Application Server and the Device.</li>
        <li>SCHC is used also on the communication leg between the Application Server and the proxy.</li>
      </ul>
      <t>Like <xref target="RFC8824"/>, the presented examples focus on SCHC Compression/Decompression of CoAP headers, i.e., irrespective of possible SCHC Compression/Decompression applied to further protocol headers.</t>
      <t>The example in <xref target="examples-without-oscore"/> considers an exchange of two unprotected messages, while the example in <xref target="examples-with-oscore"/> considers an exchange of two messages protected end-to-end with OSCORE. In the examples, the character | denotes bit concatenation.</t>
      <t><xref target="fig-example-req"/> and <xref target="fig-example-resp"/> show the two CoAP messages exchanged between the Device and the Application Server, via the proxy. The figures show the two messages as originally generated by the application at the two origin endpoints, i.e., before they are possibly protected end-to-end with OSCORE as considered by the example in <xref target="examples-with-oscore"/>.</t>
      <t>In particular, note that:</t>
      <ul spacing="normal">
        <li>On the communication leg between the Device and the proxy, the CoAP Message ID has value 0x0001 and the CoAP Token has value 0x82.</li>
        <li>On the communication leg between the proxy and the Application Server, the CoAP Message ID has value 0x0004 and the CoAP Token has value 0x75.</li>
      </ul>
      <figure anchor="fig-example-req">
        <name>CoAP GET Request</name>
        <artwork align="left"><![CDATA[
Original message:
=================
0x41010001823b6578616d706c652e636f6d
  8b74656d7065726174757265d40f636f6170

Header:
0x4101
01   Ver
  00   CON
    0001   TKL
        00000001   Request Code 1 "GET"

0x0001 = mid
0x82 = token

Options:

0x3b6578616d706c652e636f6d
Option 3: Uri-Host
Value = example.com

0x8b74656d7065726174757265
Option 11: Uri-Path
Value = temperature

0xd40f636f6170
Option 39: Proxy-Scheme
Value = coap

Original message length: 35 bytes

]]></artwork>
      </figure>
      <figure anchor="fig-example-resp">
        <name>CoAP Content Response</name>
        <artwork align="left"><![CDATA[
Original message:
=================
0x6145000475ff32332043

Header:
0x6145
01   Ver
  10   ACK
    0001   TKL
        01000101 Successful Response Code 69 "2.05 Content"

0x0004 = mid
0x75 = token


0xFF Payload marker

Payload:
0x32332043

Original message length: 10 bytes

]]></artwork>
      </figure>
      <section anchor="examples-without-oscore">
        <name>Without End-to-End Security</name>
        <t>In case OSCORE is not used end-to-end between the Device and the Application Server, the following SCHC Rules are shared between the different entities. Based on those Rules, the SCHC Compression/Decompression is performed as per <xref target="compression-with-proxies-without-oscore"/>.</t>
        <t>The Device and the proxy share the SCHC Rule shown in <xref target="fig-rules-device-proxy"/>, with RuleID 0.</t>
        <figure anchor="fig-rules-device-proxy">
          <name>SCHC Rule between the Device and the Proxy</name>
          <artwork align="center"><![CDATA[
+=====================================================================+
| RuleID 0                                                            |
+==========+=====+===+===+=============+=========+===========+========+
| Field    | FL  | FP| DI| TV          | MO      | CDA       | Sent   |
|          |     |   |   |             |         |           | [bits] |
+==========+=====+===+===+=============+=========+===========+========+
| CoAP     | 2   | 1 | Bi| 01          | equal   | not-sent  |        |
| version  |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Up| 0           | equal   | not-sent  |        |
| Type     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Dw| [0, 2]      | match   | matching- | T      |
| Type     |     |   |   |             | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 4   | 1 | Bi| 1           | equal   | not-sent  |        |
| TKL      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Up| [1, 2,      | match-  | matching- | CC     |
| Code     |     |   |   |  3, 4]      | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| [65, 68,    | match-  | matching- | CC     |
| Code     |     |   |   |  69, 132]   | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 16  | 1 | Bi| 0x00        | MSB(12) | LSB       | MMMM   |
| MID      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | tkl | 1 | Bi| 0x80        | MSB(5)  | LSB       | TTT    |
| Token    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up|             | ignore  | value-    |        |
| Uri-Host | (B) |   |   |             |         | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| temperature | equal   | not-sent  |        |
| Uri-Path |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| coap        | equal   | not-sent  |        |
| Proxy-   |     |   |   |             |         |           |        |
| Scheme   |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+

]]></artwork>
        </figure>
        <t>Instead, the proxy and the Application Server share the SCHC Rule shown in <xref target="fig-rules-proxy-server"/>, with RuleID 1.</t>
        <figure anchor="fig-rules-proxy-server">
          <name>SCHC Rule between the Proxy and the Application Server</name>
          <artwork align="center"><![CDATA[
+=====================================================================+
| RuleID 1                                                            |
+==========+=====+===+===+=============+=========+===========+========+
| Field    | FL  | FP| DI| TV          | MO      | CDA       | Sent   |
|          |     |   |   |             |         |           | [bits] |
+==========+=====+===+===+=============+=========+===========+========+
| CoAP     | 2   | 1 | Bi| 01          | equal   | not-sent  |        |
| version  |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Up| 0           | equal   | not-sent  |        |
| Type     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Dw| [0, 2]      | match   | matching- | T      |
| Type     |     |   |   |             | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 4   | 1 | Bi| 1           | equal   | not-sent  |        |
| TKL      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Up| [1, 2,      | match-  | matching- | CC     |
| Code     |     |   |   |  3, 4]      | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| [65, 68,    | match-  | matching- | CC     |
| Code     |     |   |   |  69, 132]   | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 16  | 1 | Bi| 0x00        | MSB(12) | LSB       | MMMM   |
| MID      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | tkl | 1 | Bi| 0x70        | MSB(5)  | LSB       | TTT    |
| Token    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up|             | ignore  | value-    |        |
| Uri-Host | (B) |   |   |             |         | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| temperature | equal   | not-sent  |        |
| Uri-Path |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+

]]></artwork>
        </figure>
        <t>First, the Device applies the Rule in <xref target="fig-rules-device-proxy"/> shared with the proxy to the CoAP request in <xref target="fig-example-req"/>. The result is the compressed CoAP request in <xref target="fig-example-req-to-proxy"/>, which the Device sends to the proxy.</t>
        <figure anchor="fig-example-req-to-proxy">
          <name>CoAP GET Request Compressed for the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x00055b2bc30b6b836329731b7b68 (14 bytes)
0x00 RuleID
    055b2bc30b6b836329731b7b68 compression residue
                                and padded payload

Compression Residue (101 bits -> 13 bytes with padding)
0b   00 0001 010    1011  |  0x6578616d706c652e636f6d
   code  mid tkn  Uri-Host (residue size and residue)

Compressed message length: 14 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-req-to-proxy"/>, the proxy decompresses it with the Rule in <xref target="fig-rules-device-proxy"/> shared with the Device, and obtains the same CoAP request in <xref target="fig-example-req"/>.</t>
        <t>After that, the proxy removes the Proxy-Scheme Option from the decompressed CoAP request. Also, the proxy replaces the values of the CoAP Message ID and of the CoAP Token to 0x0004 and 0x75, respectively. The result is the CoAP request shown in <xref target="fig-example-req-from-proxy"/>.</t>
        <figure anchor="fig-example-req-from-proxy">
          <name>CoAP GET Request to be Compressed by the Proxy</name>
          <artwork align="left"><![CDATA[
Message to forward:
=================
0x41010004753b6578616d706c652e636f6d
  8b74656d7065726174757265

Header:
0x4101
01   Ver
  00   CON
    0001   TKL
        00000001   Request Code 1 "GET"

0x0004 = mid
0x75 = token

Options:

0x3b6578616d706c652e636f6d
Option 3: Uri-Host
Value = example.com

0x8b74656d7065726174757265
Option 11: Uri-Path
Value = temperature

Original message length: 29 bytes

]]></artwork>
        </figure>
        <t>Then, the proxy applies the Rule in <xref target="fig-rules-proxy-server"/> shared with the Application Server to the CoAP request in <xref target="fig-example-req-from-proxy"/>.</t>
        <t>The result is the compressed CoAP request in <xref target="fig-example-req-from-proxy-compressed"/>, which the proxy forwards to the Application Server.</t>
        <figure anchor="fig-example-req-from-proxy-compressed">
          <name>CoAP GET Request Forwarded by the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message to forward:
=================
0x0112db2bc30b6b836329731b7b68 (14 bytes)
0x01 RuleID
    12db2bc30b6b836329731b7b68 compression residue
                                and padded payload


Compression Residue (101 bits -> 13 bytes with padding)
0b   00 0100 101    1011  |  0x6578616d706c652e636f6d
   code  mid tkn  Uri-Host (residue size and residue)

Compressed message length: 14 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-req-from-proxy-compressed"/>, the Application Server decompresses it using the Rule in <xref target="fig-rules-proxy-server"/> shared with the proxy. The result is the same CoAP request in <xref target="fig-example-req-from-proxy"/>, which the Application Server delivers to the application.</t>
        <t>After that, the Application Server produces the CoAP response in <xref target="fig-example-resp"/>, and compresses it using the Rule in <xref target="fig-rules-proxy-server"/> shared with the proxy. The result is the compressed CoAP response shown in <xref target="fig-example-resp-to-proxy"/>, which the Application Server sends to the proxy.</t>
        <figure anchor="fig-example-resp-to-proxy">
          <name>CoAP Content Response Compressed for the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x01c94c8cc810c0 (7 bytes)
0x01 RuleID
    c94c8cc810c0 compression residue
                 and padded payload


Compression Residue (10 bits -> 2 bytes with padding)
0b    1   10 0100 101
   type code  mid tkn

Payload
0x32332043 (4 bytes)

Compressed message length: 7 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-resp-to-proxy"/>, the proxy decompresses it using the Rule in <xref target="fig-rules-proxy-server"/> shared with the Application Server. The result is the same CoAP response in <xref target="fig-example-resp"/>.</t>
        <t>Then, the proxy replaces the values of the CoAP Message ID and of the CoAP Token to 0x0001 and 0x82, respectively. The result is the CoAP response shown in <xref target="fig-example-resp-from-proxy"/>.</t>
        <figure anchor="fig-example-resp-from-proxy">
          <name>CoAP Content Response to be Compressed by the Proxy</name>
          <artwork align="left"><![CDATA[
Message to forward:
=================
0x6145000182ff32332043

Header:
0x6145
01   Ver
  10   ACK
    0001   TKL
        01000101 Successful Response Code 69 "2.05 Content"

0x0001 = mid
0x82 = token


0xFF Payload marker

Payload:
0x32332043

Original message length: 10 bytes

]]></artwork>
        </figure>
        <t>Then, the proxy compresses the CoAP response in <xref target="fig-example-resp-from-proxy"/> with the Rule in <xref target="fig-rules-device-proxy"/> shared with the Device. The result is the compressed CoAP response shown in <xref target="fig-example-resp-from-proxy-compressed"/>, which the proxy forwards to the Device.</t>
        <figure anchor="fig-example-resp-from-proxy-compressed">
          <name>CoAP Content Response Forwarded by the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x00c28c8cc810c0 (7 bytes)
0x00 RuleID
    c28c8cc810c0 compression residue
                 and padded payload


Compression Residue (10 bits -> 2 bytes with padding)
0b    1   10 0001 010
   type code  mid tkn

Payload
0x32332043 (4 bytes)

Compressed message length: 7 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-resp-from-proxy-compressed"/>, the Device decompresses it using the Rule in <xref target="fig-rules-device-proxy"/> shared with the proxy. The result is the same CoAP request in <xref target="fig-example-resp-from-proxy"/>, which the Device delivers to the application.</t>
      </section>
      <section anchor="examples-with-oscore">
        <name>With End-to-End Security</name>
        <t>In case OSCORE is used end-to-end between the Device and the Application Server, the following SCHC Rules are shared between the different entities. Based on those Rules, the SCHC Compression/Decompression is performed as per <xref target="compression-with-proxies-with-oscore"/>.</t>
        <t>The Device and the Application Server share the SCHC Rule shown in <xref target="fig-rules-oscore-device-server"/>, with RuleID 2. The Device and the Application Server use this Rule to perform the Inner SCHC Compression/Decompression end-to-end.</t>
        <figure anchor="fig-rules-oscore-device-server">
          <name>Inner SCHC Rule between the Device and the Application Server</name>
          <artwork align="center"><![CDATA[
+=====================================================================+
| RuleID 2                                                            |
+==========+=====+===+===+=============+=========+===========+========+
| Field    | FL  | FP| DI| TV          | MO      | CDA       | Sent   |
|          |     |   |   |             |         |           | [bits] |
+==========+=====+===+===+=============+=========+===========+========+
| CoAP     | 8   | 1 | Up| [1, 2,      | match-  | matching- | CC     |
| Code     |     |   |   |  3, 4]      | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| [65, 68,    | match-  | matching- | CC     |
| Code     |     |   |   |  69, 132]   | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| temperature | equal   | not-sent  |        |
| Uri-Path |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+

]]></artwork>
        </figure>
        <t>The Device and the proxy share the SCHC Rule shown in <xref target="fig-rules-oscore-device-proxy"/>, with RuleID 3. The Device and the proxy use this Rule to perform the Outer SCHC Compression/Decompression hop-by-hop on their communication leg.</t>
        <figure anchor="fig-rules-oscore-device-proxy">
          <name>Outer SCHC Rule between the Device and the Proxy</name>
          <artwork align="center"><![CDATA[
+=====================================================================+
| RuleID 3                                                            |
+==========+=====+===+===+=============+=========+===========+========+
| Field    | FL  | FP| DI| TV          | MO      | CDA       | Sent   |
|          |     |   |   |             |         |           | [bits] |
+==========+=====+===+===+=============+=========+===========+========+
| CoAP     | 2   | 1 | Bi| 01          | equal   | not-sent  |        |
| version  |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Up| 0           | equal   | not-sent  |        |
| Type     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Dw| [0, 2]      | match   | matching- | T      |
| Type     |     |   |   |             | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 4   | 1 | Bi| 1           | equal   | not-sent  |        |
| TKL      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Up| 2           | equal   | not-sent  |        |
| Code     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| 68          | equal   | not-sent  |        |
| Code     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 16  | 1 | Bi| 0x00        | MSB(12) | LSB       | MMMM   |
| MID      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | tkl | 1 | Bi| 0x80        | MSB(5)  | LSB       | TTT    |
| Token    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up|             | ignore  | value-    |        |
| Uri-Host | (B) |   |   |             |         | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Up| 0x09        | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| flags    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| 0x00        | MSB(4)  | LSB       | PPPP   |
| OSCORE   |     |   |   |             |         |           |        |
| piv      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| 0x0000      | MSB(12) | LSB       | KKKK   |
| OSCORE_  |     |   |   |             |         |           |        |
| kid      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Bi| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| kidctx   |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| flags    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Dw| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| piv      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Dw| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| kid      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| coap        | equal   | not-sent  |        |
| Proxy-   |     |   |   |             |         |           |        |
| Scheme   |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+

]]></artwork>
        </figure>
        <t>The proxy and the Application Server share the SCHC Rule shown in <xref target="fig-rules-oscore-proxy-server"/>, with RuleID 4. The proxy and the Application Server use this Rule to perform the Outer SCHC Compression/Decompression hop-by-hop on their communication leg.</t>
        <figure anchor="fig-rules-oscore-proxy-server">
          <name>Outer SCHC Rule between the Proxy and the Application Server</name>
          <artwork align="center"><![CDATA[
+=====================================================================+
| RuleID 4                                                            |
+==========+=====+===+===+=============+=========+===========+========+
| Field    | FL  | FP| DI| TV          | MO      | CDA       | Sent   |
|          |     |   |   |             |         |           | [bits] |
+==========+=====+===+===+=============+=========+===========+========+
| CoAP     | 2   | 1 | Bi| 01          | equal   | not-sent  |        |
| version  |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Up| 0           | equal   | not-sent  |        |
| Type     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 2   | 1 | Dw| [0, 2]      | match   | matching- | T      |
| Type     |     |   |   |             | mapping | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 4   | 1 | Bi| 1           | equal   | not-sent  |        |
| TKL      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Up| 2           | equal   | not-sent  |        |
| Code     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| 68          | equal   | not-sent  |        |
| Code     |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 16  | 1 | Bi| 0x00        | MSB(12) | LSB       | MMMM   |
| MID      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | tkl | 1 | Bi| 0x70        | MSB(5)  | LSB       | TTT    |
| Token    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up|             | ignore  | value-    |        |
| Uri-Host | (B) |   |   |             |         | sent      |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Up| 0x09        | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| flags    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| 0x00        | MSB(4)  | LSB       | PPPP   |
| OSCORE   |     |   |   |             |         |           |        |
| piv      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Up| 0x0000      | MSB(12) | LSB       | KKKK   |
| OSCORE_  |     |   |   |             |         |           |        |
| kid      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Bi| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| kidctx   |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | 8   | 1 | Dw| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| flags    |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Dw| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| piv      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+
| CoAP     | var | 1 | Dw| b''         | equal   | not-sent  |        |
| OSCORE_  |     |   |   |             |         |           |        |
| kid      |     |   |   |             |         |           |        |
+----------+-----+---+---+-------------+---------+-----------+--------+

]]></artwork>
        </figure>
        <t>When the Device applies the Rule in <xref target="fig-rules-oscore-device-server"/> shared with the Application Server to the CoAP request in <xref target="fig-example-req"/>, this results in the Compressed Plaintext shown in <xref target="fig-plaintext-req"/>.</t>
        <t>As per <xref section="7.2" sectionFormat="of" target="RFC8824"/>, the message follows the process of SCHC Inner Compression and encryption until the payload (if any). The ciphertext resulting from the overall Inner process is used as payload of the Outer OSCORE message.</t>
        <figure anchor="fig-plaintext-req">
          <name>Plaintext Compression and Encryption for the GET Request</name>
          <artwork align="center"><![CDATA[
      _____________________________________________________
     |                                                     |
     | OSCORE Plaintext                                    |
     |                                                     |
     | 0x01bb74656d7065726174757265  (13 bytes)            |
     |                                                     |
     | 0x01 Request Code GET                               |
     |                                                     |
     |      0xbb74656d7065726174757265 Option 11: URI_PATH |
     |                                 Value = temperature |
     |_____________________________________________________|

                                 |
                                 | Inner SCHC Compression
                                 |
                                 v
          _________________________________________________
         |                                                 |
         | Compressed Plaintext                            |
         |                                                 |
         | 0x0200 (2 bytes)                                |
         |                                                 |
         |                                                 |
         | RuleID = 0x02 (1 byte)                          |
         |                                                 |
         |                                                 |
         | Compression residue                             |
         | and padded payload = 0x00 (1 byte)              |
         |                                                 |
         | 0b00 (2 bits match-mapping Compression Residue) |
         | 0b000000 (6 bit padding)                        |
         |_________________________________________________|

                                 |
                                 | AEAD Encryption
                                 |  (piv = 0x04)
                                 |
                                 v
           ________________________________________________
          |                                                |
          | encrypted_plaintext = 0xa2cf (2 bytes)         |
          | tag = 0xc54fe1b434297b62 (8 bytes)             |
          |                                                |
          | ciphertext = 0xa2cfc54fe1b434297b62 (10 bytes) |
          |________________________________________________|

]]></artwork>
        </figure>
        <t>When the Application Server applies the Rule in <xref target="fig-rules-oscore-device-server"/> shared with the Device to the CoAP response in <xref target="fig-example-resp"/>, this results in the Compressed Plaintext shown in <xref target="fig-plaintext-resp"/>.</t>
        <t>As per <xref section="7.2" sectionFormat="of" target="RFC8824"/>, the message follows the process of SCHC Inner Compression and encryption until the payload (if any). The ciphertext resulting from the overall Inner process is used as payload of the Outer OSCORE message.</t>
        <figure anchor="fig-plaintext-resp">
          <name>Plaintext Compression and Encryption for the Content Response</name>
          <artwork align="center"><![CDATA[
              _________________________________________________
             |                                                 |
             | OSCORE Plaintext                                |
             |                                                 |
             | 0x45ff32332043  (6 bytes)                       |
             |                                                 |
             | 0x45 Successful Response Code 69 "2.05 Content" |
             |                                                 |
             |     0xff Payload marker                         |
             |                                                 |
             |         0x32332043 Payload                      |
             |_________________________________________________|

                                 |
                                 | Inner SCHC Compression
                                 |
                                 v
              _________________________________________________
             |                                                 |
             | Compressed Plaintext                            |
             |                                                 |
             | 0x028c8cc810c0 (6 bytes)                        |
             |                                                 |
             |                                                 |
             | RuleID = 0x02                                   |
             |                                                 |
             |                                                 |
             | Compression residue                             |
             | and padded payload = 0x8c8cc810c0 (5 bytes)     |
             |                                                 |
             | 0b10 (2 bits match-mapping Compression Residue) |
             |       0x32332043 >> 2 (shifted payload)         |
             |                        0b000000 Padding         |
             |_________________________________________________|

                                 |
                                 | AEAD Encryption
                                 |  (piv = 0x04)
                                 |
                                 v
      _________________________________________________________
     |                                                         |
     |  encrypted_plaintext = 0x10c6d7c26cc1 (6 bytes)         |
     |  tag = 0xe9aef3f2461e0c29 (8 bytes)                     |
     |                                                         |
     |  ciphertext = 0x10c6d7c26cc1e9aef3f2461e0c29 (14 bytes) |
     |_________________________________________________________|

]]></artwork>
        </figure>
        <t>After having performed the SCHC Inner Compression of the CoAP request in <xref target="fig-example-req"/>, the Device protects it with OSCORE by considering the Compressed Plaintext in <xref target="fig-plaintext-req"/>. The result is the OSCORE-protected CoAP request shown in <xref target="fig-example-oscore-req"/>.</t>
        <figure anchor="fig-example-oscore-req">
          <name>Protected and Inner SCHC Compressed CoAP GET Request</name>
          <artwork align="left"><![CDATA[
Protected message:
==================
0x41020001823b6578616d706c652e636f6d
  6409040005d411636f6170ffa2cfc54fe1b434297b62
(39 bytes)

Header:
0x4102
01   Ver
  00   CON
    0001   TKL
        00000010   Request Code 2 "POST"

0x0001 = mid
0x82 = token

Options:

0x3b6578616d706c652e636f6d
Option 3: Uri-Host
Value = example.com

0x6409040005
Option 9: OSCORE
Value = 0x09040005
          09 = 000 0 1 001 flag byte
                   h k  n
            04 piv
              0005 kid

0xd411636f6170
Option 39: Proxy-Scheme
Value = coap


0xFF Payload marker

Payload:
0xa2cfc54fe1b434297b62 (10 bytes)

]]></artwork>
        </figure>
        <t>Then, the Device applies the Rule in <xref target="fig-rules-oscore-device-proxy"/> shared with the proxy to the OSCORE-protected CoAP request in <xref target="fig-example-oscore-req"/>, thus performing the SCHC Outer Compression of such request. The result is the OSCORE-protected and Outer Compressed CoAP request shown in <xref target="fig-example-oscore-req-to-proxy"/>, which the Device sends to the proxy.</t>
        <figure anchor="fig-example-oscore-req-to-proxy">
          <name>SCHC-OSCORE CoAP GET Request Compressed for the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x03156caf0c2dae0d8ca5cc6deda8b459f8a9fc3686852f6c40 (25 bytes)
0x03 RuleID
    156caf0c2dae0d8ca5cc6deda8b459f8a9fc3686852f6c40 compression
                                                     residue and
                                                     padded payload


Compression Residue (107 bits -> 14 bytes with padding)
0b 0001 010    1011  |  0x6578616d706c652e636f6d  |  0b 0100 0101
    mid tkn  Uri-Host (residue size and residue)         piv  kid

Payload
0xa2cfc54fe1b434297b62 (10 bytes)

Compressed message length: 25 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-oscore-req-to-proxy"/>, the proxy decompresses it with the Rule in <xref target="fig-rules-oscore-device-proxy"/> shared with the Device, thus performing the SCHC Outer Decompression. The result is the same OSCORE-protected CoAP request in <xref target="fig-example-oscore-req"/>.</t>
        <t>After that, the proxy removes the Proxy-Scheme Option from the decompressed OSCORE-protected CoAP request. Also, the proxy replaces the values of the CoAP Message ID and of the CoAP Token to 0x0004 and 0x75, respectively. The result is the OSCORE-protected CoAP request shown in <xref target="fig-example-oscore-req-from-proxy"/>.</t>
        <figure anchor="fig-example-oscore-req-from-proxy">
          <name>SCHC-OSCORE CoAP GET Request to be Compressed by the Proxy</name>
          <artwork align="left"><![CDATA[
Protected message:
==================
0x41020004753b6578616d706c652e636f6d
  6409040005ffa2cfc54fe1b434297b62
(33 bytes)

Header:
0x4102
01   Ver
  00   CON
    0001   TKL
        00000010   Request Code 2 "POST"

0x0004 = mid
0x75 = token

Options:

0x3b6578616d706c652e636f6d
Option 3: Uri-Host
Value = example.com

0x6409040005
Option 9: OSCORE
Value = 0x09040005
          09 = 000 0 1 001 flag byte
                   h k  n
            04 piv
              0005 kid


0xFF Payload marker

Payload:
0xa2cfc54fe1b434297b62 (10 bytes)

]]></artwork>
        </figure>
        <t>Then, the proxy applies the Rule in <xref target="fig-rules-oscore-proxy-server"/> shared with the Application Server to the OSCORE-protected CoAP request in <xref target="fig-example-oscore-req-from-proxy"/>, thus performing the SCHC Outer Compression of such request. The result is the OSCORE-protected and Outer Compressed CoAP request shown in <xref target="fig-example-oscore-req-from-proxy-compressed"/>, which the proxy forwards to the Application Server.</t>
        <figure anchor="fig-example-oscore-req-from-proxy-compressed">
          <name>SCHC-OSCORE CoAP GET Request Forwarded by the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x044b6caf0c2dae0d8ca5cc6deda8b459f8a9fc3686852f6c40 (25 bytes)
0x04 RuleID
    4b6caf0c2dae0d8ca5cc6deda8b459f8a9fc3686852f6c40 compression
                                                     residue and
                                                     padded payload


Compression Residue (107 bits -> 14 bytes with padding)
0b 0100 101    1011  |  0x6578616d706c652e636f6d  |  0b 0100 0101
    mid tkn  Uri-Host (residue size and residue)         piv  kid

Payload
0xa2cfc54fe1b434297b62 (10 bytes)

Compressed message length: 25 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-oscore-req-from-proxy-compressed"/>, the Application Server decompresses it using the Rule in <xref target="fig-rules-oscore-proxy-server"/> shared with the proxy, thus performing the SCHC Outer Decompression. The result is the same OSCORE-protected CoAP request in <xref target="fig-example-oscore-req-from-proxy"/>.</t>
        <t>The Application Server decrypts and verifies such a request, which results in the same Compressed Plaintext in <xref target="fig-plaintext-req"/>. Then, the Application Server applies the Rule in <xref target="fig-rules-oscore-device-server"/> shared with the Device to such a Compressed Plaintext, thus performing the SCHC Inner Decompression. The result is used to rebuild the same CoAP request in <xref target="fig-example-req"/>, which the Application Server delivers to the application.</t>
        <t>After having performed the SCHC Inner Compression of the CoAP response in <xref target="fig-example-resp"/>, the Application Server protects it with OSCORE by considering the Compressed Plaintext in <xref target="fig-plaintext-resp"/>. The result is the OSCORE-protected CoAP response shown in <xref target="fig-example-oscore-resp"/>.</t>
        <figure anchor="fig-example-oscore-resp">
          <name>Protected and Inner SCHC Compressed CoAP Content Response</name>
          <artwork align="left"><![CDATA[
Protected message:
==================
0x614400047590ff10c6d7c26cc1e9aef3f2461e0c29
(21 bytes)

Header:
0x6144
01   Ver
  10   ACK
    0001   TKL
        01000100   Successful Response Code 68 "2.04 Changed"

0x0004 = mid
0x75 = token

Options:

0x90
Option 9: OSCORE
Value = b''


0xFF Payload marker

Payload:
0x10c6d7c26cc1e9aef3f2461e0c29 (14 bytes)

]]></artwork>
        </figure>
        <t>Then, the Application Server applies the Rule in <xref target="fig-rules-oscore-proxy-server"/> shared with the proxy to the OSCORE-protected CoAP response in <xref target="fig-example-oscore-resp"/>, thus performing the SCHC Outer Compression of such response. The result is the OSCORE-protected and Outer Compressed CoAP response shown in <xref target="fig-example-oscore-resp-to-proxy"/>, which the Application Server sends to the proxy.</t>
        <figure anchor="fig-example-oscore-resp-to-proxy">
          <name>SCHC-OSCORE CoAP Content Response Compressed for the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x04a510c6d7c26cc1e9aef3f2461e0c29  (16 bytes)
0x04 RuleID
    a510c6d7c26cc1e9aef3f2461e0c29 compression residue
                                   and padded payload


Compression Residue (8 bits -> 1 byte with padding)
0b    1 0100 101
   type  mid tkn

Payload
0x10c6d7c26cc1e9aef3f2461e0c29 (14 bytes)

Compressed message length: 16 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-oscore-resp-to-proxy"/>, the proxy decompresses it with the Rule in <xref target="fig-rules-oscore-proxy-server"/> shared with the Application Server, thus performing the SCHC Outer Decompression. The result is the same OSCORE-protected CoAP response in <xref target="fig-example-oscore-resp"/>.</t>
        <t>After that, the proxy replaces the values of the CoAP Message ID and of the CoAP Token to 0x0001 and 0x82, respectively. The result is the OSCORE-protected CoAP response shown in <xref target="fig-example-oscore-resp-from-proxy"/>.</t>
        <figure anchor="fig-example-oscore-resp-from-proxy">
          <name>SCHC-OSCORE CoAP Content Response to be Compressed by the Proxy</name>
          <artwork align="left"><![CDATA[
Protected message:
==================
0x614400018290ff10c6d7c26cc1e9aef3f2461e0c29
(21 bytes)

Header:
0x6144
01   Ver
  10   ACK
    0001   TKL
        01000100   Successful Response Code 68 "2.04 Changed"

0x0001 = mid
0x82 = token

Options:

0x90
Option 9: OSCORE
Value = b''


0xFF Payload marker

Payload:
0x10c6d7c26cc1e9aef3f2461e0c29 (14 bytes)

]]></artwork>
        </figure>
        <t>Then, the proxy applies the Rule in <xref target="fig-rules-oscore-device-proxy"/> shared with the Device to the OSCORE-protected CoAP response in <xref target="fig-example-oscore-resp-from-proxy"/>, thus performing the SCHC Outer Compression of such response. The result is the OSCORE-protected and Outer Compressed CoAP response shown in <xref target="fig-example-oscore-resp-from-proxy-compressed"/>, which the proxy forwards to the Device.</t>
        <figure anchor="fig-example-oscore-resp-from-proxy-compressed">
          <name>SCHC-OSCORE CoAP Content Response Forwarded by the Proxy</name>
          <artwork align="left"><![CDATA[
Compressed message:
=================
0x038a10c6d7c26cc1e9aef3f2461e0c29 (16 bytes)
0x03 RuleID
    8a10c6d7c26cc1e9aef3f2461e0c29 compression residue
                                   and padded payload


Compression Residue (8 bits -> 1 byte with padding)
0b    1 0001 010
   type  mid tkn

Payload
0x10c6d7c26cc1e9aef3f2461e0c29 (14 bytes)

Compressed message length: 15 bytes

]]></artwork>
        </figure>
        <t>Upon receiving the message in <xref target="fig-example-oscore-resp-from-proxy-compressed"/>, the Device decompresses it using the Rule in <xref target="fig-rules-oscore-device-proxy"/> shared with the proxy, thus performing the SCHC Outer Decompression. The result is the same OSCORE-protected CoAP response in <xref target="fig-example-oscore-resp-from-proxy"/>.</t>
        <t>The Device decrypts and verifies such a response, which results in the same Compressed Plaintext in <xref target="fig-plaintext-resp"/>. Then, the Device applies the Rule in <xref target="fig-rules-oscore-device-server"/> shared with the Application Server to such a Compressed Plaintext, thus performing the SCHC Inner Decompression. The result is used to rebuild the same CoAP response in <xref target="fig-example-resp"/>, which the Device delivers to the application.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations discussed in <xref target="RFC8724"/> and <xref target="RFC8824"/> continue to apply.  When SCHC is used in the presence of CoAP proxies, the security considerations discussed in <xref section="11.2" sectionFormat="of" target="RFC7252"/> continue to apply. When SCHC is used with OSCORE, the security considerations discussed in <xref target="RFC8613"/> continue to apply.</t>
      <t>The security considerations in <xref target="RFC8824"/> specifically discuss how the use of SCHC for CoAP when OSCORE is also used may result in (more frequently) triggering key-renewal operations for the two endpoints. This can be due to an earlier exhaustion of the OSCORE Sender Sequence Number space, or to the installation of new compression Rules on one of the endpoints.</t>
      <t>In either case, the two endpoints can run the key update protocol KUDOS defined in <xref target="I-D.ietf-core-oscore-key-update"/>, as the recommended method to update their shared OSCORE Security Context.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no actions for IANA.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7959">
          <front>
            <title>Block-Wise Transfers in the Constrained Application Protocol (CoAP)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="Z. Shelby" initials="Z." role="editor" surname="Shelby"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful transfer protocol for constrained nodes and networks. Basic CoAP messages work well for small payloads from sensors and actuators; however, applications will need to transfer larger payloads occasionally -- for instance, for firmware updates. In contrast to HTTP, where TCP does the grunt work of segmenting and resequencing, CoAP is based on datagram transports such as UDP or Datagram Transport Layer Security (DTLS). These transports only offer fragmentation, which is even more problematic in constrained nodes and networks, limiting the maximum size of resource representations that can practically be transferred.</t>
              <t>Instead of relying on IP fragmentation, this specification extends basic CoAP with a pair of "Block" options for transferring multiple blocks of information from a resource representation in multiple request-response pairs. In many important cases, the Block options enable a server to be truly stateless: the server can handle each block transfer separately, with no need for a connection setup or other server-side memory of previous block transfers. Essentially, the Block options provide a minimal way to transfer larger representations in a block-wise fashion.</t>
              <t>A CoAP implementation that does not support these options generally is limited in the size of the representations that can be exchanged, so there is an expectation that the Block options will be widely used in CoAP implementations. Therefore, this specification updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7959"/>
          <seriesInfo name="DOI" value="10.17487/RFC7959"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8724">
          <front>
            <title>SCHC: Generic Framework for Static Context Header Compression and Fragmentation</title>
            <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
            <author fullname="L. Toutain" initials="L." surname="Toutain"/>
            <author fullname="C. Gomez" initials="C." surname="Gomez"/>
            <author fullname="D. Barthel" initials="D." surname="Barthel"/>
            <author fullname="JC. Zuniga" initials="JC." surname="Zuniga"/>
            <date month="April" year="2020"/>
            <abstract>
              <t>This document defines the Static Context Header Compression and fragmentation (SCHC) framework, which provides both a header compression mechanism and an optional fragmentation mechanism. SCHC has been designed with Low-Power Wide Area Networks (LPWANs) in mind.</t>
              <t>SCHC compression is based on a common static context stored both in the LPWAN device and in the network infrastructure side. This document defines a generic header compression mechanism and its application to compress IPv6/UDP headers.</t>
              <t>This document also specifies an optional fragmentation and reassembly mechanism. It can be used to support the IPv6 MTU requirement over the LPWAN technologies. Fragmentation is needed for IPv6 datagrams that, after SCHC compression or when such compression was not possible, still exceed the Layer 2 maximum payload size.</t>
              <t>The SCHC header compression and fragmentation mechanisms are independent of the specific LPWAN technology over which they are used. This document defines generic functionalities and offers flexibility with regard to parameter settings and mechanism choices. This document standardizes the exchange over the LPWAN between two SCHC entities. Settings and choices specific to a technology or a product are expected to be grouped into profiles, which are specified in other documents. Data models for the context and profiles are out of scope.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8724"/>
          <seriesInfo name="DOI" value="10.17487/RFC8724"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8768">
          <front>
            <title>Constrained Application Protocol (CoAP) Hop-Limit Option</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="T. Reddy.K" initials="T." surname="Reddy.K"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>The presence of Constrained Application Protocol (CoAP) proxies may lead to infinite forwarding loops, which is undesirable. To prevent and detect such loops, this document specifies the Hop-Limit CoAP option.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8768"/>
          <seriesInfo name="DOI" value="10.17487/RFC8768"/>
        </reference>
        <reference anchor="RFC8824">
          <front>
            <title>Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)</title>
            <author fullname="A. Minaburo" initials="A." surname="Minaburo"/>
            <author fullname="L. Toutain" initials="L." surname="Toutain"/>
            <author fullname="R. Andreasen" initials="R." surname="Andreasen"/>
            <date month="June" year="2021"/>
            <abstract>
              <t>This document defines how to compress Constrained Application Protocol (CoAP) headers using the Static Context Header Compression and fragmentation (SCHC) framework. SCHC defines a header compression mechanism adapted for Constrained Devices. SCHC uses a static description of the header to reduce the header's redundancy and size. While RFC 8724 describes the SCHC compression and fragmentation framework, and its application for IPv6/UDP headers, this document applies SCHC to CoAP headers. The CoAP header structure differs from IPv6 and UDP, since CoAP uses a flexible header with a variable number of options, themselves of variable length. The CoAP message format is asymmetric: the request messages have a header format different from the format in the response messages. This specification gives guidance on applying SCHC to flexible headers and how to leverage the asymmetry for more efficient compression Rules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8824"/>
          <seriesInfo name="DOI" value="10.17487/RFC8824"/>
        </reference>
        <reference anchor="RFC9175">
          <front>
            <title>Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing</title>
            <author fullname="C. Amsüss" initials="C." surname="Amsüss"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <date month="February" year="2022"/>
            <abstract>
              <t>This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non-secure reuse of Tokens to ensure response-to-request binding when CoAP is used with a security protocol, and amplification mitigation (where the use of the Echo option is now recommended).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9175"/>
          <seriesInfo name="DOI" value="10.17487/RFC9175"/>
        </reference>
        <reference anchor="RFC9177">
          <front>
            <title>Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission</title>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair"/>
            <author fullname="J. Shallow" initials="J." surname="Shallow"/>
            <date month="March" year="2022"/>
            <abstract>
              <t>This document specifies alternative Constrained Application Protocol (CoAP) block-wise transfer options: Q-Block1 and Q-Block2.</t>
              <t>These options are similar to, but distinct from, the CoAP Block1 and Block2 options defined in RFC 7959. The Q-Block1 and Q-Block2 options are not intended to replace the Block1 and Block2 options but rather have the goal of supporting Non-confirmable (NON) messages for large amounts of data with fewer packet interchanges. Also, the Q-Block1 and Q-Block2 options support faster recovery should any of the blocks get lost in transmission.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9177"/>
          <seriesInfo name="DOI" value="10.17487/RFC9177"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-edhoc">
          <front>
            <title>Using EDHOC with CoAP and OSCORE</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Stefan Hristozov" initials="S." surname="Hristozov">
              <organization>Fraunhofer AISEC</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   The lightweight authenticated key exchange protocol EDHOC can be run
   over CoAP and used by two peers to establish an OSCORE Security
   Context.  This document details this use of the EDHOC protocol, by
   specifying a number of additional and optional mechanisms.  These
   especially include an optimization approach for combining the
   execution of EDHOC with the first OSCORE transaction.  This
   combination reduces the number of round trips required to set up an
   OSCORE Security Context and to complete an OSCORE transaction using
   that Security Context.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-edhoc-07"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Jiye Park" initials="J." surname="Park">
              <organization>Universitaet Duisburg-Essen</organization>
            </author>
            <date day="22" month="June" year="2023"/>
            <abstract>
              <t>   This document defines the security protocol Group Object Security for
   Constrained RESTful Environments (Group OSCORE), providing end-to-end
   security of CoAP messages exchanged between members of a group, e.g.,
   sent over IP multicast.  In particular, the described protocol
   defines how OSCORE is used in a group communication setting to
   provide source authentication for CoAP group requests, sent by a
   client to multiple servers, and for protection of the corresponding
   CoAP responses.  Group OSCORE also defines a pairwise mode where each
   member of the group can efficiently derive a symmetric pairwise key
   with any other member of the group for pairwise OSCORE communication.
   Group OSCORE can be used between endpoints communicating with CoAP or
   CoAP-mappable HTTP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-18"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-key-update">
          <front>
            <title>Key Update for OSCORE (KUDOS)</title>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="13" month="March" year="2023"/>
            <abstract>
              <t>   This document defines Key Update for OSCORE (KUDOS), a lightweight
   procedure that two CoAP endpoints can use to update their keying
   material by establishing a new OSCORE Security Context.  Accordingly,
   it updates the use of the OSCORE flag bits in the CoAP OSCORE Option
   as well as the protection of CoAP response messages with OSCORE, and
   it deprecates the key update procedure specified in Appendix B.2 of
   RFC 8613.  Thus, this document updates RFC 8613.  Also, this document
   defines a procedure that two endpoints can use to update their OSCORE
   identifiers, run either stand-alone or during a KUDOS execution.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-key-update-04"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Chonggang Wang" initials="C." surname="Wang">
              <organization>InterDigital</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="11" month="January" year="2023"/>
            <abstract>
              <t>   This document specifies the use of the Constrained Application
   Protocol (CoAP) for group communication, including the use of UDP/IP
   multicast as the default underlying data transport.  Both unsecured
   and secured CoAP group communication are specified.  Security is
   achieved by use of the Group Object Security for Constrained RESTful
   Environments (Group OSCORE) protocol.  The target application area of
   this specification is any group communication use cases that involve
   resource-constrained devices or networks that support CoAP.  This
   document replaces RFC 7390, while it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-08"/>
        </reference>
        <reference anchor="I-D.ietf-lake-edhoc">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="7" month="July" year="2023"/>
            <abstract>
              <t>   This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a
   very compact and lightweight authenticated Diffie-Hellman key
   exchange with ephemeral keys.  EDHOC provides mutual authentication,
   forward secrecy, and identity protection.  EDHOC is intended for
   usage in constrained scenarios and a main use case is to establish an
   OSCORE security context.  By reusing COSE for cryptography, CBOR for
   encoding, and CoAP for transport, the additional code size can be
   kept very low.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lake-edhoc-20"/>
        </reference>
      </references>
    </references>
    <section anchor="yang-data-model">
      <name>YANG Data Model</name>
      <t>TBD</t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Quentin Lampin"/>, <contact fullname="John Preuß Mattsson"/>, <contact fullname="Carles Gomez Montenegro"/>, <contact fullname="Göran Selander"/>, <contact fullname="Pascal Thubert"/>, and <contact fullname="Éric Vyncke"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by the H2020 projects SIFIS-Home (Grant agreement 952652) and ARCADIAN-IoT (Grant agreement 101020259).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
