<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-intarea-proxy-config-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="Proxy Configuration PvDs">Communicating Proxy Configurations in Provisioning Domains</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-intarea-proxy-config-01"/>
    <author initials="T." surname="Pauly" fullname="Tommy Pauly">
      <organization>Apple, Inc.</organization>
      <address>
        <email>tpauly@apple.com</email>
      </address>
    </author>
    <author initials="D." surname="Damjanovic" fullname="Dragana Damjanovic">
      <organization>Microsoft</organization>
      <address>
        <email>ddamjanovic@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="08"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 26?>

<t>This document defines a mechanism for accessing provisioning domain information
associated with a proxy, such as other proxy URIs that support different protocols
and a list of DNS zones that are accessible via a proxy.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/tfpauly/privacy-proxy"/>.</t>
    </note>
  </front>
  <middle>
    <?line 32?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>HTTP proxies that use the CONNECT method <xref section="9.3.6" sectionFormat="of" target="HTTP"/>
(often referred to as "forward" proxies) allow clients to open connections to
hosts via a proxy. These typically allow for TCP stream proxying, but can also support
UDP proxying <xref target="CONNECT-UDP"/> and IP packet proxying
<xref target="CONNECT-IP"/>. Such proxies are not just defined as
hostnames and ports, but can use URI templates <xref target="URITEMPLATE"/>.</t>
      <t>In order to make use of multiple related proxies, clients need a way to understand
which proxies are associated with one another.</t>
      <t>Client can also benefit from learning about additional information associated with
the proxy to optimize their proxy usage, such knowing that a proxy is configured
to only allow access to a limited set of next hops.</t>
      <t>These improvements to client behavior can be achieved through the use of
Provisioning Domains. Provisioning Domains (PvDs) are defined in <xref target="PVD"/>
as consistent sets of network configuration information, which can include proxy
configuration details <xref section="2" sectionFormat="of" target="PVD"/>. <xref target="PVDDATA"/> defines a JSON
<xref target="JSON"/> format for describing Provisioning Domain Additional Information,
which is an extensible dictionary of properties of the Provisioning Domain.</t>
      <t>This document defines several mechanisms to use PvDs to help clients understand how
to use proxies:</t>
      <ol spacing="normal" type="1"><li>
          <t>A way to fetch PvD Additional Information associated with a known proxy URI (<xref target="proxy-pvd"/>)</t>
        </li>
        <li>
          <t>A way to list one or more proxy URIs in a PvD, allowing clients to
learn about other proxy options given a known proxy (<xref target="proxy-enumeration"/>).</t>
        </li>
        <li>
          <t>A way to define a limited set of DNS zones that are accessible through the
proxy (<xref target="split-dns"/>).</t>
        </li>
      </ol>
      <t>Additionally, this document partly describes how these mechanisms might be used
to discover proxies associated with a network (<xref target="network-proxies"/>).</t>
      <section anchor="background">
        <name>Background</name>
        <t>Other non-standard mechanisms for proxy configuration and discovery have been
used historically, some of which are described in <xref target="RFC3040"/>.</t>
        <t>Proxy Auto Configuration (PAC) files <xref section="6.2" sectionFormat="of" target="RFC3040"/> are Javascript
scripts that take URLs as input and provide an output of a proxy configuration
to use.</t>
        <t>Web Proxy Auto-Discovery Protocol (WPAD) <xref section="6.4" sectionFormat="of" target="RFC3040"/> allows
networks to advertise proxies to use by advertising a PAC file. This solution
squats on DHCP option 252.</t>
        <t>These common (but non-standard) mechanisms only support defining proxies by
hostname and port, and do not support configuring a full URI template
<xref target="URITEMPLATE"/>.</t>
        <t>The mechanisms defined in this document are intended to offer a standard
alternative that works for URI-based proxies and avoids dependencies
on executing Javascript scripts, which can open up security vulnerabilities.</t>
      </section>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="proxy-pvd">
      <name>Fetching PvD Additional Information for proxies</name>
      <t>This document defines a way to fetch PvD Additional Information associated with
a proxy. This PvD describes the properties of the network accessible through the proxy.</t>
      <t>In order to fetch PvD Additional Information associated with a proxy, a client
issues an HTTP GET request for the well-known PvD URI (".well-known/pvd") <xref target="PVDDATA"/>
and the host authority of the proxy. This is applicable for both proxies that are identified
by a host and port only (such as SOCKS proxies and HTTP CONNECT proxies) and proxies
that are identified by a URI or URI template.</t>
      <t>For example, a client would issue the following request for the PvD associated
with "https://proxy.example.org/masque{?target_host,target_port}":</t>
      <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
      <t>For a HTTP CONNECT proxy on "proxy.example.org:8080", the client would send the following
request:</t>
      <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org:8080
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
      <t>Note that all proxies that are colocated on the same host and port share the same PvD
Additional Information. Proxy deployments that need separate PvD configuration properties
SHOULD use different hosts.</t>
      <t>PvD Additional Information is required to contain the "identifier", "expires", and
"prefixes" keys. For proxy PvDs as defined in this document, the "identifier" MUST
match the hostname of the HTTP proxy. The "prefixes" array SHOULD be empty by default.</t>
    </section>
    <section anchor="proxy-enumeration">
      <name>Enumerating proxies within a PvD</name>
      <t>This document defines a new PvD Additional Information key, <tt>proxies</tt>, that
is an array of dictionaries, where each dictionary in the array defines
a single proxy that is available as part of the PvD (see <xref target="proxies-key-iana"/>).
Each proxy is defined by a proxy protocol, a proxy location (i.e., a hostname and port or a URI template
<xref target="URITEMPLATE"/>), along with potentially other keys.</t>
      <t>This document defines two mandatory keys for the sub-dictionaries in the
<tt>proxies</tt> array, <tt>protocol</tt> and <tt>proxy</tt>. There are also optional key, including
<tt>alpn</tt>, and keys for split-DNS defined in <xref target="split-dns"/>.
Other optional keys can be added to the dictionary
to further define or restrict the use of a proxy. Clients that do not
recognize or understand a key in a proxy sub-dictionary MUST ignore the entire
proxy definition, since the proxy might be only applicable for particular
uses. These keys are registered in an IANA registry, defined in <xref target="proxy-info-iana"/>.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JSON Key</th>
            <th align="left">Optional</th>
            <th align="left">Description</th>
            <th align="left">Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">protocol</td>
            <td align="left">No</td>
            <td align="left">The protocol used to communicate with the proxy</td>
            <td align="left">String</td>
            <td align="left">"connect-udp"</td>
          </tr>
          <tr>
            <td align="left">proxy</td>
            <td align="left">No</td>
            <td align="left">String containing the URI template or hostname and port of the proxy, depending on the format defined by the protocol</td>
            <td align="left">String</td>
            <td align="left">"https://proxy.example.org:4443/masque{?target_host,target_port}"</td>
          </tr>
          <tr>
            <td align="left">alpn</td>
            <td align="left">Yes</td>
            <td align="left">An array of Application-Layer Protocol Negotiation protocol identifiers</td>
            <td align="left">Array of Strings</td>
            <td align="left">["h3","h2"]</td>
          </tr>
        </tbody>
      </table>
      <t>The values for the <tt>protocol</tt> key are defined in the proxy protocol
registry (<xref target="proxy-protocol-iana"/>), with the initial contents provided below.
For consistency, any new proxy types that use HTTP Upgrade Tokens (and use
the <tt>:protocol</tt> pseudo-header) SHOULD define the <tt>protocol</tt> value to match
the Upgrade Token / <tt>:protocol</tt> value.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Proxy Protocol</th>
            <th align="left">Proxy Location Format</th>
            <th align="left">Reference</th>
            <th align="left">Notes</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">socks5</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref target="SOCKSv5"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">http-connect</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref section="9.3.6" sectionFormat="of" target="HTTP"/></td>
            <td align="left">Standard CONNECT method, using unencrypted HTTP to the proxy</td>
          </tr>
          <tr>
            <td align="left">https-connect</td>
            <td align="left">hostname:port</td>
            <td align="left">
              <xref section="9.3.6" sectionFormat="of" target="HTTP"/></td>
            <td align="left">Standard CONNECT method, using TLS-protected HTTP to the proxy</td>
          </tr>
          <tr>
            <td align="left">connect-udp</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-UDP"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">connect-ip</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-IP"/></td>
            <td align="left"> </td>
          </tr>
          <tr>
            <td align="left">connect-tcp</td>
            <td align="left">URI template</td>
            <td align="left">
              <xref target="CONNECT-TCP"/></td>
            <td align="left"> </td>
          </tr>
        </tbody>
      </table>
      <t>The value of <tt>proxy</tt> depends on the Proxy Location Format defined by proxy protocol.
The types defined here either use a hostname and port, or a full URI template.</t>
      <t>If the <tt>alpn</tt> key is present, it provides a hint for the Application-Layer Protocol Negotiation
(ALPN) <xref target="ALPN"/> protocol identifiers associated with this server. For HTTP proxies,
this can indicate if the proxy supports HTTP/3, HTTP/2, etc.</t>
      <t>When a PvD that contains the <tt>proxies</tt> key is fetched from a known proxy
using the method described in <xref target="proxy-pvd"/> the proxies list describes
equivalent proxies (potentially supporting other protocols) that can be used
in addition to the known proxy.</t>
      <t>Such cases are useful for informing clients of related proxies as a discovery
method, with the assumption that the client already is aware of one proxy.
Many historical methods of configuring a proxy only allow configuring
a single FQDN hostname for the proxy. A client can attempt to fetch the
PvD information from the well-known URI to learn the list of complete
URIs that support non-default protocols, such as <xref target="CONNECT-UDP"/> and
<xref target="CONNECT-IP"/>.</t>
      <section anchor="example">
        <name>Example</name>
        <t>Given a known HTTP CONNECT proxy FQDN, "proxy.example.org", a client could
request PvD Additional Information with the following request:</t>
        <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
        <t>If the proxy has a PvD definition for this FQDN, it would return the following
response to indicate a PvD that has two related proxy URIs.</t>
        <artwork><![CDATA[
:status = 200
content-type = application/pvd+json
content-length = 222

{
  "identifier": "proxy.example.org.",
  "expires": "2023-06-23T06:00:00Z",
  "prefixes": [],
  "proxies": [
    {
      "protocol": "http-connect",
      "proxy": "proxy.example.org:80"
    },
    {
      "protocol": "connect-udp",
      "proxy": "https://proxy.example.org/masque{?target_host,target_port}"
    }
  ]
}
]]></artwork>
        <t>The client would learn the URI template of the proxy that supports UDP using <xref target="CONNECT-UDP"/>,
at "https://proxy.example.org/masque{?target_host,target_port}".</t>
      </section>
    </section>
    <section anchor="split-dns">
      <name>Split DNS information for proxies</name>
      <t>Split DNS configurations are cases where only a subset of domains is routed through
a VPN tunnel or a proxy. For example, IKEv2 defines split DNS configuration in
<xref target="IKEV2SPLIT"/>.</t>
      <t>PvD Additional Information can be used to indicate that a proxy PvD has a split DNS
configuration.</t>
      <t>This document defines two optional keys that for subdictionaries in the <tt>proxies</tt>
array that are used for split-DNS configuration.</t>
      <table>
        <thead>
          <tr>
            <th align="left">JSON Key</th>
            <th align="left">Optional</th>
            <th align="left">Description</th>
            <th align="left">Type</th>
            <th align="left">Example</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">matchDomains</td>
            <td align="left">Yes</td>
            <td align="left">An array of DNS zones or subdomains that can be accessed over this proxy</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "example.com" ]</td>
          </tr>
          <tr>
            <td align="left">excludedDomains</td>
            <td align="left">Yes</td>
            <td align="left">An array of DNS zones or subdomains that cannot be accessed over this proxy, which should be more specific domains of entries in the matchDomains array</td>
            <td align="left">Array of Strings</td>
            <td align="left">[ "public.example.com" ]</td>
          </tr>
        </tbody>
      </table>
      <t>When present in a PvD Additional Information dictionary that is retrieved for a proxy
as described in <xref target="proxy-pvd"/>, domains in the <tt>matchDomains</tt> array indicate specific zones
that are accessible using the proxy. If a hostname is not included in the enumerated
zones, then a client SHOULD assume that the hostname will not be accessible through the
proxy. If a hostname is included in the <tt>excludedDomains</tt> array, then the client SHOULD NOT
access it through the proxy.</t>
      <t>Entries listed in <tt>matchDomains</tt> MUST NOT expand the set of domains that a client is
willing to send to a particular proxy. The list can only narrow the list of domains
that the client is willing to send through the proxy. For example, if the client
has a local policy to only send requests for "example.com" to a proxy
"proxy.example.com", and the <tt>matchDomains</tt> array contains "internal.example.com" and
"other.company.com", the client would end up only proxying "internal.example.com"
through the proxy.</t>
      <section anchor="example-1">
        <name>Example</name>
        <t>Given a proxy URI template "https://proxy.example.org/masque{?target_host,target_port}",
which in this case is for UDP proxying, the client could request PvD additional information
with the following request:</t>
        <artwork><![CDATA[
:method = GET
:scheme = https
:authority = proxy.example.org
:path = /.well-known/pvd
accept = application/pvd+json
]]></artwork>
        <t>If the proxy has a PvD definition for this proxy, it could return the following
response to indicate a PvD that has one accessible zone, "internal.example.org".</t>
        <artwork><![CDATA[
:status = 200
content-type = application/pvd+json
content-length = 135

{
  "identifier": "proxy.example.org.",
  "expires": "2023-06-23T06:00:00Z",
  "prefixes": [],
  "proxies": [
    {
      "protocol": "http-connect",
      "proxy": "proxy.example.org:80"
    },
    {
      "protocol": "connect-udp",
      "proxy": "https://proxy.example.org/masque{?target_host,target_port}",
      "matchDomains": [ "internal.example.org" ]
    }
  ]
}
]]></artwork>
        <t>The client could then choose to use this proxy only for accessing names that fall
within the "internal.example.org" zone.</t>
      </section>
    </section>
    <section anchor="network-proxies">
      <name>Discovering proxies from network PvDs</name>
      <t><xref target="PVDDATA"/> defines how PvD Additional Information is discovered based
on network advertisements using Router Advertisements <xref target="RFC4861"/>. A network
defining its configuration via PvD information can include the <tt>proxies</tt>
key (<xref target="proxy-enumeration"/>) to inform clients of a list of proxies available
on the network.</t>
      <t>This association of proxies with the network's PvD can be used as a mechanism
to discover proxies, as an alternative to PAC files. However, client systems MUST
NOT automatically send traffic over proxies advertised in this way without
explicit configuration, policy, or user permission. For example, a client
can use this mechanism to choose between known proxies, such as if the client was
already proxying traffic and has multiple options to choose between.</t>
      <t>Further security and experience considerations are needed for these cases.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Configuration advertised via PvD Additional Information, such DNS zones or associated
proxies, can only be safely used when fetched over a secure TLS-protected connection,
and the client has validated that that the hostname of the proxy, the identifier of
the PvD, and the validated hostname identity on the certificate all match.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="proxies-key-iana">
        <name>New PvD Additional Information key</name>
        <t>This document registers a new key in the "Additional Information PvD Keys" registry.</t>
        <t>JSON Key: proxies</t>
        <t>Description: Array of proxy dictionaries associated with this PvD</t>
        <t>Type: Array of dictionaries</t>
        <t>Example: [ {
  "protocol": "connect-udp",
  "proxy": "https://proxy.example.org/masque{?target_host,target_port}"
} ]</t>
      </section>
      <section anchor="proxy-info-iana">
        <name>New PvD Proxy Information Registry</name>
        <t>IANA is requested to create a new registry "Proxy Information PvD Keys", within the "Provisioning Domains (PvDs)" registry page.
This new registry reserves JSON keys for use in sub-dictionaries under the <tt>proxies</tt> key.
The initial contents of this registry are given in <xref target="proxy-enumeration"/> and <xref target="split-dns"/>.</t>
        <t>New assignments in the "Proxy Information PvD Keys" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>. Experts are
requested to ensure that defined keys do not overlap in names or semantics.</t>
      </section>
      <section anchor="proxy-protocol-iana">
        <name>New PvD Proxy Protocol Registry</name>
        <t>IANA is requested to create a new registry "Proxy Protocol PvD Values", within the "Provisioning Domains (PvDs)" registry page.
This new registry reserves JSON values for the <tt>protocol</tt> key in <tt>proxies</tt> sub-dictionaries.
The initial contents of this registry are given in <xref target="proxy-enumeration"/>.</t>
        <t>New assignments in the "Proxy Protocol PvD Values" registry will be administered by IANA through Expert Review <xref target="RFC8126"/>.
Experts are requested to ensure that defined keys do not overlap in names or semantics, and have clear format definitions.
The reference and notes fields MAY be empty.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="HTTP">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="CONNECT-UDP">
          <front>
            <title>Proxying UDP in HTTP</title>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <date month="August" year="2022"/>
            <abstract>
              <t>This document describes how to proxy UDP in HTTP, similar to how the HTTP CONNECT method allows proxying TCP in HTTP. More specifically, this document defines a protocol that allows an HTTP client to create a tunnel for UDP communications through an HTTP server that acts as a proxy.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9298"/>
          <seriesInfo name="DOI" value="10.17487/RFC9298"/>
        </reference>
        <reference anchor="CONNECT-IP">
          <front>
            <title>Proxying IP in HTTP</title>
            <author fullname="T. Pauly" initials="T." role="editor" surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="A. Chernyakhovsky" initials="A." surname="Chernyakhovsky"/>
            <author fullname="M. Kühlewind" initials="M." surname="Kühlewind"/>
            <author fullname="M. Westerlund" initials="M." surname="Westerlund"/>
            <date month="October" year="2023"/>
            <abstract>
              <t>This document describes how to proxy IP packets in HTTP. This protocol is similar to UDP proxying in HTTP but allows transmitting arbitrary IP packets. More specifically, this document defines a protocol that allows an HTTP client to create an IP tunnel through an HTTP server that acts as an IP proxy. This document updates RFC 9298.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9484"/>
          <seriesInfo name="DOI" value="10.17487/RFC9484"/>
        </reference>
        <reference anchor="URITEMPLATE">
          <front>
            <title>URI Template</title>
            <author fullname="J. Gregorio" initials="J." surname="Gregorio"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="M. Hadley" initials="M." surname="Hadley"/>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="D. Orchard" initials="D." surname="Orchard"/>
            <date month="March" year="2012"/>
            <abstract>
              <t>A URI Template is a compact sequence of characters for describing a range of Uniform Resource Identifiers through variable expansion. This specification defines the URI Template syntax and the process for expanding a URI Template into a URI reference, along with guidelines for the use of URI Templates on the Internet. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6570"/>
          <seriesInfo name="DOI" value="10.17487/RFC6570"/>
        </reference>
        <reference anchor="PVDDATA">
          <front>
            <title>Discovering Provisioning Domain Names and Data</title>
            <author fullname="P. Pfister" initials="P." surname="Pfister"/>
            <author fullname="É. Vyncke" surname="É. Vyncke"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="D. Schinazi" initials="D." surname="Schinazi"/>
            <author fullname="W. Shao" initials="W." surname="Shao"/>
            <date month="July" year="2020"/>
            <abstract>
              <t>Provisioning Domains (PvDs) are defined as consistent sets of network configuration information. PvDs allows hosts to manage connections to multiple networks and interfaces simultaneously, such as when a home router provides connectivity through both a broadband and cellular network provider.</t>
              <t>This document defines a mechanism for explicitly identifying PvDs through a Router Advertisement (RA) option. This RA option announces a PvD identifier, which hosts can compare to differentiate between PvDs. The option can directly carry some information about a PvD and can optionally point to PvD Additional Information that can be retrieved using HTTP over TLS.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8801"/>
          <seriesInfo name="DOI" value="10.17487/RFC8801"/>
        </reference>
        <reference anchor="JSON">
          <front>
            <title>The JavaScript Object Notation (JSON) Data Interchange Format</title>
            <author fullname="T. Bray" initials="T." role="editor" surname="Bray"/>
            <date month="December" year="2017"/>
            <abstract>
              <t>JavaScript Object Notation (JSON) is a lightweight, text-based, language-independent data interchange format. It was derived from the ECMAScript Programming Language Standard. JSON defines a small set of formatting rules for the portable representation of structured data.</t>
              <t>This document removes inconsistencies with other specifications of JSON, repairs specification errors, and offers experience-based interoperability guidance.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="90"/>
          <seriesInfo name="RFC" value="8259"/>
          <seriesInfo name="DOI" value="10.17487/RFC8259"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SOCKSv5">
          <front>
            <title>SOCKS Protocol Version 5</title>
            <author fullname="M. Leech" initials="M." surname="Leech"/>
            <author fullname="M. Ganis" initials="M." surname="Ganis"/>
            <author fullname="Y. Lee" initials="Y." surname="Lee"/>
            <author fullname="R. Kuris" initials="R." surname="Kuris"/>
            <author fullname="D. Koblas" initials="D." surname="Koblas"/>
            <author fullname="L. Jones" initials="L." surname="Jones"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo describes a protocol that is an evolution of the previous version of the protocol, version 4 [1]. This new protocol stems from active discussions and prototype implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1928"/>
          <seriesInfo name="DOI" value="10.17487/RFC1928"/>
        </reference>
        <reference anchor="CONNECT-TCP">
          <front>
            <title>Template-Driven HTTP CONNECT Proxying for TCP</title>
            <author fullname="Benjamin M. Schwartz" initials="B. M." surname="Schwartz">
              <organization>Meta Platforms, Inc.</organization>
            </author>
            <date day="1" month="July" year="2024"/>
            <abstract>
              <t>   TCP proxying using HTTP CONNECT has long been part of the core HTTP
   specification.  However, this proxying functionality has several
   important deficiencies in modern HTTP environments.  This
   specification defines an alternative HTTP proxy service configuration
   for TCP connections.  This configuration is described by a URI
   Template, similar to the CONNECT-UDP and CONNECT-IP protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-httpbis-connect-tcp-03"/>
        </reference>
        <reference anchor="ALPN">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl"/>
            <author fullname="A. Popov" initials="A." surname="Popov"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Stephan" initials="E." surname="Stephan"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PVD">
          <front>
            <title>Multiple Provisioning Domain Architecture</title>
            <author fullname="D. Anipko" initials="D." role="editor" surname="Anipko"/>
            <date month="June" year="2015"/>
            <abstract>
              <t>This document is a product of the work of the Multiple Interfaces Architecture Design team. It outlines a solution framework for some of the issues experienced by nodes that can be attached to multiple networks simultaneously. The framework defines the concept of a Provisioning Domain (PvD), which is a consistent set of network configuration information. PvD-aware nodes learn PvD-specific information from the networks they are attached to and/or other sources. PvDs are used to enable separation and configuration consistency in the presence of multiple concurrent connections.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7556"/>
          <seriesInfo name="DOI" value="10.17487/RFC7556"/>
        </reference>
        <reference anchor="RFC3040">
          <front>
            <title>Internet Web Replication and Caching Taxonomy</title>
            <author fullname="I. Cooper" initials="I." surname="Cooper"/>
            <author fullname="I. Melve" initials="I." surname="Melve"/>
            <author fullname="G. Tomlinson" initials="G." surname="Tomlinson"/>
            <date month="January" year="2001"/>
            <abstract>
              <t>This memo specifies standard terminology and the taxonomy of web replication and caching infrastructure as deployed today. It introduces standard concepts, and protocols used today within this application domain. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3040"/>
          <seriesInfo name="DOI" value="10.17487/RFC3040"/>
        </reference>
        <reference anchor="IKEV2SPLIT">
          <front>
            <title>Split DNS Configuration for the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <author fullname="P. Wouters" initials="P." surname="Wouters"/>
            <date month="May" year="2019"/>
            <abstract>
              <t>This document defines two Configuration Payload Attribute Types (INTERNAL_DNS_DOMAIN and INTERNAL_DNSSEC_TA) for the Internet Key Exchange Protocol version 2 (IKEv2). These payloads add support for private (internal-only) DNS domains. These domains are intended to be resolved using non-public DNS servers that are only reachable through the IPsec connection. DNS resolution for other domains remains unchanged. These Configuration Payloads only apply to split- tunnel configurations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8598"/>
          <seriesInfo name="DOI" value="10.17487/RFC8598"/>
        </reference>
        <reference anchor="RFC4861">
          <front>
            <title>Neighbor Discovery for IP version 6 (IPv6)</title>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <author fullname="E. Nordmark" initials="E." surname="Nordmark"/>
            <author fullname="W. Simpson" initials="W." surname="Simpson"/>
            <author fullname="H. Soliman" initials="H." surname="Soliman"/>
            <date month="September" year="2007"/>
            <abstract>
              <t>This document specifies the Neighbor Discovery protocol for IP Version 6. IPv6 nodes on the same link use Neighbor Discovery to discover each other's presence, to determine each other's link-layer addresses, to find routers, and to maintain reachability information about the paths to active neighbors. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4861"/>
          <seriesInfo name="DOI" value="10.17487/RFC4861"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
