<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-core-groupcomm-proxy-05" category="std" consensus="true" submissionType="IETF" updates="7252" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.1 -->
  <front>
    <title abbrev="Proxy Operations for Group Communication">Proxy Operations for CoAP Group Communication</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-proxy-05"/>
    <author initials="M." surname="Tiloca" fullname="Marco Tiloca">
      <organization>RISE AB</organization>
      <address>
        <postal>
          <street>Isafjordsgatan 22</street>
          <city>Kista</city>
          <code>164 40</code>
          <country>Sweden</country>
        </postal>
        <email>marco.tiloca@ri.se</email>
      </address>
    </author>
    <author initials="E." surname="Dijk" fullname="Esko Dijk">
      <organization>IoTconsultancy.nl</organization>
      <address>
        <postal>
          <city>Utrecht</city>
          <country>The Netherlands</country>
        </postal>
        <email>esko.dijk@iotconsultancy.nl</email>
      </address>
    </author>
    <date year="2025" month="September" day="03"/>
    <workgroup>CoRE Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 65?>

<t>This document defines a specific realization of proxy intended for scenarios that use group communication for the Constrained Application Protocol (CoAP). Such a proxy processes a single request sent by a client typically over unicast and distributes the request to a group of servers, e.g., over UDP/IP multicast as the defined default transport protocol. Then, the proxy collects the individual responses from those servers and relays those responses back to the client, in a way that allows the client to distinguish the responses and their origin servers through embedded addressing information. This document updates RFC7252 with respect to caching of response messages at proxies.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://github.com/core-wg/groupcomm-proxy"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="intro">
      <name>Introduction</name>
      <t>The Constrained Application Protocol (CoAP) <xref target="RFC7252"/> allows the presence of proxies, as intermediary entities supporting clients by performing requests on their behalf and relaying back responses.</t>
      <t>CoAP supports also group communication <xref target="I-D.ietf-core-groupcomm-bis"/>, e.g., over IP multicast, where a group request can be addressed to multiple recipient servers, each of which may reply with an individual unicast response. As discussed in Sections <xref target="I-D.ietf-core-groupcomm-bis" section="E" sectionFormat="bare"/> and <xref target="I-D.ietf-core-groupcomm-bis" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-core-groupcomm-bis"/>, this group communication scenario poses a number of issues and limitations to proxy operations.</t>
      <t>In particular, the client typically sends to the proxy a single unicast request, which the proxy forwards to a group of CoAP servers, e.g., using UDP/IP multicast as the defined default transport protocol for CoAP group requests (see <xref section="1.1" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>). Later on, the proxy replies to the client's original unicast request, by relaying back the responses from the servers.</t>
      <t>As per <xref target="RFC7252"/>, a CoAP-to-CoAP proxy relays those responses to the client as separate CoAP messages, all matching (by Token value) with the client's original unicast request. A possible alternative approach for aggregating those responses into a single CoAP response sent to the client would require a specific aggregation Content-Format, which is not available yet. Both these approaches pose issues.</t>
      <t>This document takes the former approach and accordingly defines a specific realization of proxy intended for scenarios that use group communication for CoAP. That is, after forwarding a CoAP group request from the client to the group of CoAP servers, the proxy relays the individual responses back to the client as separate CoAP messages. The defined realization of proxy addresses all the related issues raised in Sections <xref target="I-D.ietf-core-groupcomm-bis" section="E" sectionFormat="bare"/> and <xref target="I-D.ietf-core-groupcomm-bis" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-core-groupcomm-bis"/>. To this end, this document specifies a dedicated signaling protocol based on two new CoAP options and used by the client and the proxy.</t>
      <t>By using this protocol, the client explicitly confirms its intent to perform a proxied group request and its support for receiving multiple responses as a result, i.e., one or more from each origin server. Also, the client signals for how long it is willing to wait for responses. When relaying to the client a response to the group request, the proxy indicates addressing information pertaining to the origin server. This enables the client to distinguish multiple different responses by origin and to possibly contact one or more of the respective servers by sending individual unicast requests to the indicated addresses. In doing these follow-up unicast requests, the client can optionally bypass the proxy.</t>
      <t>Like <xref target="I-D.ietf-core-groupcomm-bis"/>, this document refers to UDP/IP multicast as the transport protocol that a proxy uses to forward a CoAP group request to a group of servers. While other transport protocols such as broadcast, non-IP multicast, and geocast can also be possible to employ, their use is not considered in this document.</t>
      <t>This document also defines how the proposed protocol is used between an HTTP client and an HTTP-to-CoAP cross-proxy, in order to forward an HTTP group request from the client to a group of CoAP servers and relay back the individual CoAP responses as HTTP responses.</t>
      <t>Finally, this document defines a caching model for proxies and specifies how they can serve a group request by using cached responses. Therefore, this document updates <xref target="RFC7252"/>.</t>
      <section anchor="terminology">
        <name>Terminology</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

<t>Readers are expected to be familiar with the terms and concepts from the following specifications:</t>
        <ul spacing="normal">
          <li>
            <t>CoAP <xref target="RFC7252"/> and group communication for CoAP <xref target="I-D.ietf-core-groupcomm-bis"/>.</t>
          </li>
          <li>
            <t>Object Security for Constrained RESTful Environments (OSCORE) <xref target="RFC8613"/> and Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          </li>
          <li>
            <t>Concise Data Definition Language (CDDL) <xref target="RFC8610"/>, Concise Binary Object Representation (CBOR) <xref target="RFC8949"/>, and CBOR sequences <xref target="RFC8742"/></t>
          </li>
          <li>
            <t>Constrained Resource Identifiers (CRIs) <xref target="I-D.ietf-core-href"/>.</t>
          </li>
        </ul>
        <t>Unless specified otherwise, the term "proxy" refers to a CoAP-to-CoAP forward-proxy, as defined in <xref section="5.7.2" sectionFormat="of" target="RFC7252"/>.</t>
        <t>This document also uses the following terminology.</t>
        <ul spacing="normal">
          <li>
            <t>Individual request: a request that an origin client sends to a single origin server within a group, either directly or instead indirectly via a proxy.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-multicast-timeout-option">
      <name>The Multicast-Timeout Option</name>
      <t>The Multicast-Timeout Option defined in this section has the properties summarized in <xref target="_table-multicast-timeout-option"/>, which extends Table 4 of <xref target="RFC7252"/>.</t>
      <t>The Multicast-Timeout Option is elective, unsafe to forward, and not repeatable. Since the option is not Safe-to-Forward, the column "N" indicates a dash for "not applicable". The value of the Multicast-Timeout Option specifies a timeout value in seconds, encoded as an unsigned integer (see <xref section="3.2" sectionFormat="of" target="RFC7252"/>).</t>
      <table align="center" anchor="_table-multicast-timeout-option">
        <name>The Multicast-Timeout Option. C=Critical, U=Unsafe, N=NoCacheKey, R=Repeatable</name>
        <thead>
          <tr>
            <th align="left">No.</th>
            <th align="left">C</th>
            <th align="left">U</th>
            <th align="left">N</th>
            <th align="left">R</th>
            <th align="left">Name</th>
            <th align="left">Format</th>
            <th align="left">Length</th>
            <th align="left">Default</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD1</td>
            <td align="left"> </td>
            <td align="left">x</td>
            <td align="left">-</td>
            <td align="left"> </td>
            <td align="left">Multicast-Timeout</td>
            <td align="left">uint</td>
            <td align="left">0-4</td>
            <td align="left">(none)</td>
          </tr>
        </tbody>
      </table>
      <t>This document specifically defines how this option is used by a client in a CoAP request, in order to indicate to a proxy its support for and interest in receiving multiple responses to a proxied CoAP group request (i.e., one or more responses from each origin server) and for how long it is willing to wait for receiving responses via that proxy (see <xref target="ssec-req-send-steps"/> and <xref target="ssec-req-proc-proxy-steps"/>).</t>
      <t>When sending a CoAP group request to a proxy via IP unicast, to be forwarded by the proxy to a targeted group of servers, the client includes the Multicast-Timeout Option in the request. The option value indicates after how much time in seconds the client will stop accepting responses matching its original unicast request, with the exception of notifications if the CoAP Observe Option <xref target="RFC7641"/> is used in the same request. This allows the proxy to stop relaying responses back to the client, if those are received from servers after the indicated amount of time has elapsed.</t>
      <t>The Multicast-Timeout Option is of class U in terms of OSCORE processing (see <xref section="4.1" sectionFormat="of" target="RFC8613"/>).</t>
    </section>
    <section anchor="sec-reply-from-option">
      <name>The Reply-From Option</name>
      <t>The Reply-From Option defined in this section has the properties summarized in <xref target="_table-reply-from-option"/>, which extends Table 4 of <xref target="RFC7252"/>. The option is intended only for inclusion in CoAP responses and builds on the Base-Uri Option from <xref section="3" sectionFormat="of" target="I-D.bormann-coap-misc"/>.</t>
      <t>The Reply-From Option is elective, safe to forward, and not repeatable. Since the option is intended only for responses, the column "N" indicates a dash for "not applicable".</t>
      <table align="center" anchor="_table-reply-from-option">
        <name>The Reply-From Option. C=Critical, U=Unsafe, N=NoCacheKey, R=Repeatable, (*) See below</name>
        <thead>
          <tr>
            <th align="left">No.</th>
            <th align="left">C</th>
            <th align="left">U</th>
            <th align="left">N</th>
            <th align="left">R</th>
            <th align="left">Name</th>
            <th align="left">Format</th>
            <th align="left">Length</th>
            <th align="left">Default</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD2</td>
            <td align="left"> </td>
            <td align="left"> </td>
            <td align="left">-</td>
            <td align="left"> </td>
            <td align="left">Reply-From</td>
            <td align="left">(*)</td>
            <td align="left">5-1034</td>
            <td align="left">(none)</td>
          </tr>
        </tbody>
      </table>
      <t>This document specifically defines how this option is used by a proxy that can perform proxied CoAP group requests.</t>
      <t>Upon receiving a response to such a request from an origin server, the proxy includes the Reply-From Option in the response sent to the origin client (see <xref target="sec-description"/>). The proxy uses the option to indicate addressing information pertaining to that origin server, which the client can use in order to send an individual request intended for that server.</t>
      <t>In particular, the client can use the addressing information specified in the option in order to identify the response originator and to possibly send it individual unicast requests later on, either directly or instead indirectly via the proxy.</t>
      <t>When used as defined in this document, the option value is set to the byte serialization of a CBOR sequence <xref target="RFC8742"/>, which is composed of at most two CBOR arrays.</t>
      <ul spacing="normal">
        <li>
          <t>The first CBOR array is <bcp14>REQUIRED</bcp14> and specifies a CRI (see <xref target="I-D.ietf-core-href"/>). In particular, both 'scheme' and 'authority' are given, while 'path', 'query', and 'fragment' are not given.</t>
        </li>
        <li>
          <t>The second CBOR array is <bcp14>OPTIONAL</bcp14> and specifies a CRI reference (see <xref target="I-D.ietf-core-href"/>). In particular, 'scheme' is set to <tt>null</tt> (0xf6), at least one of 'authority' and 'path' is given, and both 'query' and 'fragment' are not given.  </t>
          <t>
If 'authority' is given in this CRI reference, then 'host' <bcp14>MUST NOT</bcp14> be of the form host-name within 'authority' of the CRI specified by the first CBOR array.  </t>
          <t>
This CRI reference is relevant in some scenarios where the proxy is a reverse-proxy.</t>
        </li>
      </ul>
      <t>The detailed use of this option is specified in <xref target="ssec-resp-proc-proxy-steps"/> and <xref target="ssec-resp-proc-client-steps"/> when the proxy is a forward-proxy, and in <xref target="sec-reverse-proxies-proxy-side"/> and <xref target="sec-reverse-proxies-client-side"/> when the proxy is a reverse-proxy.</t>
      <t>The Reply-From Option is of class U in terms of OSCORE processing (see <xref section="4.1" sectionFormat="of" target="RFC8613"/>).</t>
    </section>
    <section anchor="sec-objectives">
      <name>Requirements and Objectives</name>
      <t>In this section, the word "proxy" is not limited to forward-proxies. Instead, it comprises also reverse-proxies and HTTP-to-CoAP proxies.</t>
      <t>This document assumes that the following requirements are fulfilled.</t>
      <ul spacing="normal">
        <li>
          <t>REQ1. The proxy is explicitly configured with an allow-list for performing proxied group requests on behalf of specific allowed clients.</t>
        </li>
        <li>
          <t>REQ2. The proxy <bcp14>MUST</bcp14> identify a client sending a unicast group request to be proxied, in order to verify whether the client is allowed-listed to do so. For example, this can rely on one of the following security associations.  </t>
          <ul spacing="normal">
            <li>
              <t>A TLS <xref target="RFC8446"/> or DTLS <xref target="RFC9147"/> channel between the client and the proxy, where the client has been authenticated during the secure channel establishment.</t>
            </li>
            <li>
              <t>A pairwise OSCORE <xref target="RFC8613"/> Security Context between the client and the proxy, as defined in <xref target="I-D.ietf-core-oscore-capable-proxies"/>.</t>
            </li>
          </ul>
        </li>
        <li>
          <t>REQ3. If end-to-end secure communication is required between the client and the servers in the CoAP group, exchanged messages <bcp14>MUST</bcp14> be protected by using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>, as discussed in Sections <xref target="I-D.ietf-core-groupcomm-bis" section="E" sectionFormat="bare"/> and <xref target="I-D.ietf-core-groupcomm-bis" section="F" sectionFormat="bare"/> of <xref target="I-D.ietf-core-groupcomm-bis"/>. This requires the client and the servers to have previously joined the correct OSCORE group, for instance by using the approach described in <xref target="I-D.ietf-ace-key-groupcomm-oscore"/>. The correct OSCORE group to join can be pre-configured or alternatively discovered, for instance by using the approach described in <xref target="I-D.tiloca-core-oscore-discovery"/>.</t>
        </li>
      </ul>
      <t>This document defines how to achieve the following objectives.</t>
      <ul spacing="normal">
        <li>
          <t>OBJ1. The proxy gets an indication from the client that the client is in fact interested in multiple responses to a proxied group request and is capable to handle those. With particular reference to a unicast CoAP group request sent to the proxy, this means that the client is capable to receive those responses as separate CoAP responses, each matching with the original unicast request.</t>
        </li>
        <li>
          <t>OBJ2. The proxy learns for how long it should wait for responses to a proxied group request, before starting to ignore following responses to it (except for notifications, if a CoAP Observe Option is used <xref target="RFC7641"/>).</t>
        </li>
        <li>
          <t>OBJ3. The proxy relays to the client any multiple responses to the proxied group request. With particular reference to a client's original CoAP unicast request sent to the proxy, the corresponding responses are sent to the client as separate CoAP responses, each matching with the original unicast request.</t>
        </li>
        <li>
          <t>OBJ4. The client is able to distinguish the different responses to the proxied group request, as well as their corresponding origin servers.</t>
        </li>
        <li>
          <t>OBJ5. The client is enabled to optionally contact one or more of the responding origin servers in the future, either directly or via the proxy.</t>
        </li>
      </ul>
    </section>
    <section anchor="sec-description">
      <name>Protocol Description</name>
      <t>This section specifies the steps of the signaling protocol.</t>
      <section anchor="ssec-req-send-client">
        <name>Request Sending at the Client</name>
        <t>This section defines the operations performed by the client, for sending a request targeting a group of servers via the proxy.</t>
        <section anchor="ssec-req-send-steps">
          <name>Request Sending</name>
          <t>The client proceeds according to the following steps.</t>
          <ol spacing="normal" type="1"><li>
              <t>The client prepares a unicast CoAP group request addressed to the proxy and specifies the group URI where the request has to be forwarded to.  </t>
              <t>
The client can specify the group URI as a string in the Proxy-Uri Option, or by using the Proxy-Scheme Option together with the Uri-* options (see <xref section="3.5.1" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>).  </t>
              <t>
Alternatively, the client can rely on the analogous options defined in <xref target="I-D.ietf-core-href"/>, i.e., the Proxy-Cri Option conveying a CRI equivalent to the group URI, or the Proxy-Scheme-Number Option together with the Uri-* options.</t>
            </li>
            <li>
              <t>The client <bcp14>MUST</bcp14> retain the Token value used for this original unicast request beyond the reception of a first CoAP response matching with the request. To this end, the client follows the same rules for Token retention that are defined for multicast CoAP requests in <xref section="3.1.5" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>.  </t>
              <t>
In particular, the client picks an amount of time T that it is fine to wait for before freeing up the Token value. Specifically, the value of T <bcp14>MUST</bcp14> be such that:  </t>
              <ul spacing="normal">
                <li>
                  <t>T &lt; T_r , where T_r is the amount of time that the client is fine to wait for before potentially reusing the Token value. Note that T_r <bcp14>MUST NOT</bcp14> be less than MIN_TOKEN_REUSE_TIME defined in <xref section="3.1.5" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>.</t>
                </li>
                <li>
                  <t>T should be at least the expected worst-case amount of time taken by the request and response processing on the proxy and on the servers in the addressed CoAP group.</t>
                </li>
                <li>
                  <t>T should be at least the expected worst-case round-trip delay between the client and the proxy plus the worst-case round-trip delay between the proxy and any of the origin servers.</t>
                </li>
              </ul>
            </li>
            <li>
              <t>The client <bcp14>MUST</bcp14> include the Multicast-Timeout Option defined in <xref target="sec-multicast-timeout-option"/> in the unicast request to send to the proxy. The option value specifies an amount of time T' &lt; T. The difference (T - T') should be at least the expected worst-case round-trip time between the client and the proxy.  </t>
              <t>
The client can specify T' = 0 as option value, thus indicating to be not interested in receiving responses from the origin servers through the proxy. In such a case, the client <bcp14>SHOULD</bcp14> also include a No-Response Option <xref target="RFC7967"/> with value 26 (suppress all response codes), if it supports that option.  </t>
              <t>
Consistently, if the unicast request to send to the proxy already included a No-Response Option with value 26, the client <bcp14>SHOULD</bcp14> specify T' = 0 as value of the Multicast-Timeout Option.</t>
            </li>
            <li>
              <t>The client processes the request as defined in <xref target="I-D.ietf-core-groupcomm-bis"/> and also as in <xref target="I-D.ietf-core-oscore-groupcomm"/> when secure group communication is used between the client and the servers.</t>
            </li>
            <li>
              <t>The client sends the request to the proxy as a unicast CoAP message. When doing so, the client protects the request according to the security association that it has with the proxy.</t>
            </li>
          </ol>
          <t>The exact method that the client uses to estimate the worst-case processing times and round-trip delays mentioned above is out of the scope of this document. However, such a method is expected to be already used by the client when generally determining an appropriate Token lifetime and reuse interval.</t>
        </section>
        <section anchor="ssec-req-send-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, the client follows what is specified in <xref section="3.7" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, with the difference that it sends a unicast request to the proxy, to be forwarded to the group of servers as defined in <xref target="ssec-req-send-steps"/> of this document.</t>
          <t>Furthermore, the client especially follows what is specified in <xref section="5" sectionFormat="of" target="RFC7641"/>, i.e., it registers its interest to be an observer with the proxy, as if it was communicating with the servers.</t>
        </section>
        <section anchor="ssec-cancel-forwarding">
          <name>Cancellation of Ongoing Response Forwarding</name>
          <t>After having sent the unicast request to the proxy but before timeout expiration, the client might become not interested in receiving further corresponding responses, i.e., from that point in time until T seconds have elapsed since the request was sent to the proxy.</t>
          <t>In such a case the client <bcp14>MAY</bcp14> ask the proxy for an early stop of the ongoing response forwarding, i.e., to not forward to the client any further response received to the forwarded group request from the servers.</t>
          <t>To this end, the client can rely on one of the following two approaches.</t>
          <ul spacing="normal">
            <li>
              <t>The client acts like it would at timeout expiration (see <xref target="ssec-resp-proc-client-steps"/>), i.e., it simply frees up its local Token value associated with the original unicast request sent to the proxy.  </t>
              <t>
Consequently, further responses forwarded by the proxy would result in the client sending a CoAP Reset message (RST), which the proxy would interpret as a loss of interest from the client.  </t>
              <t>
While this approach would work when using CoAP over UDP between the client and the proxy, it might not be suitable in case a different transport is used instead.</t>
            </li>
            <li>
              <t>The client sends to the proxy a new CoAP unicast request, namely Early Stop Request, such that:  </t>
              <ul spacing="normal">
                <li>
                  <t>It <bcp14>MUST</bcp14> use the request method GET.</t>
                </li>
                <li>
                  <t>It <bcp14>MUST</bcp14> use the same Token value of the original unicast request sent to the proxy. This explicitly relates the present Early Stop Request to the original unicast request.</t>
                </li>
                <li>
                  <t>It <bcp14>MUST</bcp14> include the Multicast-Timeout Option, specifying 0 as option value. This explicitly indicates the client's wish to stop receiving further responses to the original unicast request.</t>
                </li>
                <li>
                  <t>It <bcp14>MUST NOT</bcp14> include any of the following: the Proxy-Uri Option or the Proxy-Cri Option; the Proxy-Scheme Option or the Proxy-Scheme-Number Option, together with the Uri-* options. This explicitly indicates the proxy to not forward the Early Stop Request.</t>
                </li>
              </ul>
              <t>
After sending the Early Stop Request, the client frees up its local Token value associated with the original unicast request sent to the proxy.</t>
            </li>
          </ul>
          <t>Note that, irrespective of the approach used by the client, freeing up the Token value does not make it eligible for possible reuse yet (see <xref target="ssec-req-send-steps"/>).</t>
        </section>
      </section>
      <section anchor="ssec-req-proc-proxy">
        <name>Request Processing at the Proxy</name>
        <t>This section defines the operations performed by the proxy, when receiving a request to forward to a group of servers.</t>
        <section anchor="ssec-req-proc-proxy-steps">
          <name>Request Processing</name>
          <t>Upon receiving the request from the client, the proxy proceeds according to the following steps.</t>
          <ol spacing="normal" type="1"><li>
              <t>The proxy decrypts and verifies the request, according to the security association that it has with the client.</t>
            </li>
            <li>
              <t>The proxy identifies the client and verifies that the client is in fact allowed-listed to have its requests proxied to CoAP group URIs.  </t>
              <t>
If the verification fails, the proxy <bcp14>MUST</bcp14> stop processing the request and <bcp14>MUST</bcp14> reply to the client with a 4.01 (Unauthorized) response. The proxy protects the response according to the security association that it has with the client.</t>
            </li>
            <li>
              <t>The proxy verifies the presence of the Multicast-Timeout Option, as a confirmation that the client is fine to receive multiple CoAP responses matching with the same original request.  </t>
              <t>
If the Multicast-Timeout Option is not present, the proxy <bcp14>MUST</bcp14> stop processing the request and <bcp14>MUST</bcp14> reply to the client with a 4.00 (Bad Request) response. The proxy protects the response according to the security association that it has with the client.  </t>
              <t>
The response <bcp14>MUST</bcp14> include a Multicast-Timeout Option, whose value <bcp14>MUST</bcp14> be set to 0. As per <xref section="3.2" sectionFormat="of" target="RFC7252"/>, this is represented with an empty option value (a zero-length sequence of bytes). By doing so, the proxy indicates that the Multicast-Timeout Option was missing and has to be included in the request. As per <xref section="5.9.2" sectionFormat="of" target="RFC7252"/>, the response <bcp14>SHOULD</bcp14> include a diagnostic payload.</t>
            </li>
            <li>
              <t>The proxy retrieves the value T' from the Multicast-Timeout Option, and then removes the option from the client's request.</t>
            </li>
            <li>
              <t>The proxy forwards the client's request to the group of servers. In particular, the proxy sends it as a CoAP group request over IP multicast, addressed to the group URI specified by the client.</t>
            </li>
            <li>
              <t>The proxy sets a timeout with the value T' retrieved from the Multicast-Timeout Option of the original unicast request.  </t>
              <t>
In case T' &gt; 0, the proxy will ignore responses to the forwarded group request coming from servers, if received after the timeout expiration, with the exception of Observe notifications (see <xref target="ssec-resp-proc-proxy"/>).  </t>
              <t>
In case T' = 0, the proxy will ignore all responses to the forwarded group request coming from servers.</t>
            </li>
          </ol>
          <t>If the proxy supports caching of responses, it can serve the original unicast request also by using cached responses, as per <xref target="sec-proxy-caching"/>.</t>
        </section>
        <section anchor="ssec-req-proc-proxy-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, the proxy takes the role of the client and registers its own interest to observe the target resource with the servers as per <xref section="5" sectionFormat="of" target="RFC7641"/>.</t>
          <t>When doing so, the proxy especially follows what is specified for the client in <xref section="3.7" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, by forwarding the group request to the servers over IP multicast as defined in <xref target="ssec-req-proc-proxy-steps"/> of this document.</t>
        </section>
        <section anchor="ssec-cancel-forwarding-proxy">
          <name>Cancellation of Ongoing Response Forwarding</name>
          <t>As defined in <xref target="ssec-cancel-forwarding"/>, the client might ask the proxy for an early stop of the ongoing response forwarding, i.e., to stop forwarding to the client any further responses received to the forwarded group request from the servers.</t>
          <t>Consistently, the proxy stops forwarding such responses to the client, after receiving a CoAP Reset message (RST) in reply to one of such responses, or after receiving an Early Stop Request related to the ongoing response forwarding (i.e., conveying the same Token value of the original unicast request from the client).</t>
          <t>After that, in case the proxy receives further responses to the forwarded group request from the servers, the proxy <bcp14>MUST NOT</bcp14> forward those responses to the client. In fact, the proxy can safely free up its local Token value associated with that group request, which results in discarding any further responses to the same group request received from then on from the servers.</t>
        </section>
      </section>
      <section anchor="ssec-req-resp-proc-server">
        <name>Request and Response Processing at the Server</name>
        <t>This section defines the operations performed by the server, when receiving a group request from the proxy.</t>
        <section anchor="ssec-req-resp-proc-server-steps">
          <name>Request and Response Processing</name>
          <t>Upon receiving the request from the proxy, the server proceeds according to the following steps.</t>
          <ol spacing="normal" type="1"><li>
              <t>The server processes the group request as defined in <xref target="I-D.ietf-core-groupcomm-bis"/> and also as in <xref target="I-D.ietf-core-oscore-groupcomm"/> when secure group communication is used between the client and the server.</t>
            </li>
            <li>
              <t>The server processes the response to be relayed to the client as defined in <xref target="I-D.ietf-core-groupcomm-bis"/> and also as in <xref target="I-D.ietf-core-oscore-groupcomm"/> when secure group communication is used between the client and the server.</t>
            </li>
          </ol>
        </section>
        <section anchor="ssec-req-resp-proc-server-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, the server especially follows what is specified in <xref section="3.7" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/> and <xref section="5" sectionFormat="of" target="RFC7641"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resp-proc-proxy">
        <name>Response Processing at the Proxy</name>
        <t>This section defines the operations performed by the proxy, when receiving a response matching with a forwarded group request.</t>
        <section anchor="ssec-resp-proc-proxy-steps">
          <name>Response Processing</name>
          <t>Upon receiving a response matching with the group request before the amount of time T' has elapsed (see Step 6 in <xref target="ssec-req-proc-proxy-steps"/>), the proxy proceeds according to the following steps.</t>
          <ol spacing="normal" type="1"><li>
              <t>The proxy <bcp14>MUST</bcp14> include the Reply-From Option defined in <xref target="sec-reply-from-option"/> in the response. The proxy sets the option value as follows.  </t>
              <t>
The CRI present as first element of the CBOR sequence specifies the addressing information of the server generating the response. The second element of the CBOR sequence <bcp14>MUST NOT</bcp14> be present.  </t>
              <t>
If the proxy supports caching of responses (see <xref target="sec-proxy-caching"/>), the proxy <bcp14>MUST</bcp14> include the Reply-From Option in the response before caching the response. This ensures that a response to a group request conveys the addressing information of the origin server that generated the response, also when the response is forwarded to a client as retrieved from the proxy's cache.</t>
            </li>
            <li>
              <t>The proxy forwards the response back to the client. When doing so, the proxy protects the response according to the security association that it has with the client.</t>
            </li>
          </ol>
          <t>As discussed in <xref section="3.1.6" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, it is possible that the same server replies with multiple responses to the same group request, i.e., conveying the same Token value. As long as the proxy forwards responses to a group request back to the origin client, the proxy <bcp14>MUST</bcp14> follow the steps defined above and forward also such multiple responses "as they come".</t>
          <t>Upon timeout expiration, i.e., T' seconds after having sent the group request over IP multicast, the proxy frees up its local Token value associated with that request. Thus, following late responses to the same group request will be discarded and not forwarded back to the client.</t>
        </section>
        <section anchor="ssec-resp-proc-proxy-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, the proxy acts as a client registered with the servers, as described earlier in <xref target="ssec-req-proc-proxy-observe"/>.</t>
          <t>Furthermore, the proxy takes the role of a server when forwarding notifications from origin servers back to the client. To this end, the proxy follows what is specified in <xref section="3.7" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/> and <xref section="5" sectionFormat="of" target="RFC7641"/>, with the following additions.</t>
          <ul spacing="normal">
            <li>
              <t>At Step 1 in <xref target="ssec-resp-proc-proxy-steps"/>, the proxy includes the Reply-From Option in every notification, including non-2.xx notifications resulting in removing the proxy from the list of observers of the origin server.</t>
            </li>
            <li>
              <t>The proxy frees up its Token value used for a group observation only if, after the timeout expiration, no 2.xx (Success) responses matching with the group request and also including an Observe Option have been received from any origin server.  </t>
              <t>
Otherwise, after the timeout expiration and as long as observations are active with servers in the group for the target resource of the group request, notifications from those servers are forwarded back to the client as defined in <xref target="ssec-resp-proc-proxy-steps"/>, and the Token value used for the group observation is not freed during this time.</t>
            </li>
          </ul>
          <t>Finally, the proxy <bcp14>SHOULD</bcp14> regularly verify that the client is still interested in receiving observe notifications for a group observation. To this end, the proxy can rely on the same approach discussed for servers in <xref section="3.7" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, with more details available in <xref section="4.5" sectionFormat="of" target="RFC7641"/>.</t>
        </section>
      </section>
      <section anchor="ssec-resp-proc-client">
        <name>Response Processing at the Client</name>
        <t>This section defines the operations performed by the client, when receiving a response matching with a request that targeted a group of servers via the proxy.</t>
        <section anchor="ssec-resp-proc-client-steps">
          <name>Response Processing</name>
          <t>Upon receiving from the proxy a response matching with the original unicast request before the amount of time T has elapsed (see Step 2 in <xref target="ssec-req-send-steps"/>), the client proceeds according to the following steps.</t>
          <ol spacing="normal" type="1"><li>
              <t>The client processes the response as defined in <xref target="I-D.ietf-core-groupcomm-bis"/>. When doing so, the client decrypts and verifies the response according to the security association that it has with the proxy.</t>
            </li>
            <li>
              <t>If secure group communication is used end-to-end between the client and the servers, the client processes the response resulting at the end of Step 1, as defined in <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
            </li>
            <li>
              <t>The client retrieves the CRI from the value of the Reply-From Option and identifies the origin server whose addressing information is specified by the CRI. This allows the client to distinguish different responses as generated by different origin servers.  </t>
              <t>
Optionally, the client may contact one or more of those servers individually, i.e., directly (bypassing the proxy) or instead indirectly (via a proxied unicast request). To this end, the client composes the correct URI for the individual request to the origin server, by using the information specified in the CRI retrieved from the Reply-From Option.  </t>
              <t>
In order to individually reach the origin server again through the proxy, the client is not required to support the transport protocol indicated by the CRI and used between the proxy and the origin server.  </t>
              <t>
That is, the client simply specifies the URI for the individual request in the unicast request to the proxy. To this end, the client can specify the URI as a string in the Proxy-Uri Option, or by using the Proxy-Scheme Option together with the Uri-* options. Alternatively, the client can rely on the analogous options defined in <xref target="I-D.ietf-core-href"/>, i.e., on the Proxy-Cri Option conveying a CRI equivalent to the URI, or on the Proxy-Scheme-Number Option together with the Uri-* options. In either case, the client uses the transport protocol that it supports, and has used before, to send the unicast request to the proxy.</t>
            </li>
          </ol>
          <t>As discussed in <xref section="3.1.6" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, it is possible that the client receives multiple responses to the same group request (i.e., conveying the same Token) from the same origin server. The specific client implementation determines at which layer deduplication of responses is performed, or whether it is necessary in an application at all. If the processing of a response succeeds, then the client delivers the response to the application as usual. Depending on its available context information, the application itself can be in a good position to decide how to handle such responses.</t>
          <t>Upon the timeout expiration, i.e., T seconds after having sent the original unicast request to the proxy, the client frees up its local Token value associated with that request. Note that, upon this timeout expiration, the Token value is not eligible for possible reuse yet (see <xref target="ssec-req-send-steps"/>). Thus, until the actual amount of time before enabling Token reusage has elapsed, following late responses to the same request forwarded by the proxy will be discarded, as these are not matching (by Token value) with any active request from the client.</t>
        </section>
        <section anchor="ssec-resp-proc-client-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, the client frees up its Token value only if, after the timeout T expiration, no 2.xx (Success) responses matching with the original unicast request and also including an Observe Option have been received.</t>
          <t>Instead, if at least one such response has been received, the client continues receiving those notifications as they are forwarded by the proxy, as long as the observation for the target resource of the original unicast request is active.</t>
        </section>
      </section>
      <section anchor="sec-workflow-example">
        <name>Example</name>
        <t>The example in this section refers to the following actors.</t>
        <ul spacing="normal">
          <li>
            <t>One origin client C, with address C_ADDR and port number C_PORT.</t>
          </li>
          <li>
            <t>One proxy P, with address P_ADDR and port number P_PORT.</t>
          </li>
          <li>
            <t>Two origin servers S1 and S2, where the server Sx has address Sx_ADDR and port number Sx_PORT.</t>
          </li>
        </ul>
        <t>The origin servers are members of a CoAP group with IP multicast address G_ADDR and port number G_PORT. Also, the origin servers are members of the same application group and share the same resource /r.</t>
        <t>The communication between C and P is based on CoAP over UDP, as per <xref target="RFC7252"/>. The communication between P and the origin servers is based on CoAP over UDP and IP multicast, as per <xref target="I-D.ietf-core-groupcomm-bis"/>.</t>
        <t>Finally, cri'X' denotes a CRI corresponding to the URI X.</t>
        <figure anchor="workflow-example">
          <name>Workflow Example with a Forward-Proxy</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="832" width="568" viewBox="0 0 568 832" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,816" fill="none" stroke="black"/>
                <path d="M 264,48 L 264,768" fill="none" stroke="black"/>
                <path d="M 448,48 L 448,264" fill="none" stroke="black"/>
                <path d="M 448,280 L 448,584" fill="none" stroke="black"/>
                <path d="M 448,632 L 448,816" fill="none" stroke="black"/>
                <path d="M 560,48 L 560,816" fill="none" stroke="black"/>
                <path d="M 8,64 L 256,64" fill="none" stroke="black"/>
                <path d="M 264,240 L 440,240" fill="none" stroke="black"/>
                <path d="M 408,272 L 552,272" fill="none" stroke="black"/>
                <path d="M 272,400 L 448,400" fill="none" stroke="black"/>
                <path d="M 16,480 L 264,480" fill="none" stroke="black"/>
                <path d="M 272,592 L 560,592" fill="none" stroke="black"/>
                <path d="M 16,672 L 264,672" fill="none" stroke="black"/>
                <path d="M 392,240 L 408,272" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="560,272 548,266.4 548,277.6" fill="black" transform="rotate(0,552,272)"/>
                <polygon class="arrowhead" points="448,240 436,234.4 436,245.6" fill="black" transform="rotate(0,440,240)"/>
                <polygon class="arrowhead" points="280,592 268,586.4 268,597.6" fill="black" transform="rotate(180,272,592)"/>
                <polygon class="arrowhead" points="280,400 268,394.4 268,405.6" fill="black" transform="rotate(180,272,400)"/>
                <polygon class="arrowhead" points="264,64 252,58.4 252,69.6" fill="black" transform="rotate(0,256,64)"/>
                <polygon class="arrowhead" points="24,672 12,666.4 12,677.6" fill="black" transform="rotate(180,16,672)"/>
                <polygon class="arrowhead" points="24,480 12,474.4 12,485.6" fill="black" transform="rotate(180,16,480)"/>
                <g class="text">
                  <text x="8" y="36">C</text>
                  <text x="264" y="36">P</text>
                  <text x="452" y="36">S1</text>
                  <text x="556" y="36">S2</text>
                  <text x="36" y="84">Src:</text>
                  <text x="112" y="84">C_ADDR:C_PORT</text>
                  <text x="36" y="100">Dst:</text>
                  <text x="112" y="100">P_ADDR:P_PORT</text>
                  <text x="60" y="116">Proxi-Uri:</text>
                  <text x="132" y="132">"coap://G_ADDR:G_PORT/r"</text>
                  <text x="92" y="148">Multicast-Timeout:</text>
                  <text x="180" y="148">60</text>
                  <text x="292" y="196">Src:</text>
                  <text x="368" y="196">P_ADDR:P_PORT</text>
                  <text x="292" y="212">Dst:</text>
                  <text x="368" y="212">G_ADDR:G_PORT</text>
                  <text x="312" y="228">Uri-Path:</text>
                  <text x="368" y="228">"r"</text>
                  <text x="280" y="324">/</text>
                  <text x="296" y="324">t</text>
                  <text x="312" y="324">=</text>
                  <text x="328" y="324">0</text>
                  <text x="344" y="324">:</text>
                  <text x="360" y="324">P</text>
                  <text x="396" y="324">starts</text>
                  <text x="312" y="340">accepting</text>
                  <text x="392" y="340">responses</text>
                  <text x="288" y="356">for</text>
                  <text x="324" y="356">this</text>
                  <text x="376" y="356">request</text>
                  <text x="416" y="356">/</text>
                  <text x="292" y="420">Src:</text>
                  <text x="372" y="420">S1_ADDR:G_PORT</text>
                  <text x="292" y="436">Dst:</text>
                  <text x="368" y="436">P_ADDR:P_PORT</text>
                  <text x="36" y="500">Src:</text>
                  <text x="112" y="500">P_ADDR:P_PORT</text>
                  <text x="36" y="516">Dst:</text>
                  <text x="112" y="516">C_ADDR:C_PORT</text>
                  <text x="64" y="532">Reply-From:</text>
                  <text x="140" y="548">cri'coap://S1_ADDR:G_PORT'</text>
                  <text x="404" y="612">Src:</text>
                  <text x="488" y="612">S2_ADDR:S2_PORT</text>
                  <text x="404" y="628">Dst:</text>
                  <text x="480" y="628">P_ADDR:P_PORT</text>
                  <text x="36" y="692">Src:</text>
                  <text x="112" y="692">P_ADDR:P_PORT</text>
                  <text x="36" y="708">Dst:</text>
                  <text x="112" y="708">C_ADDR:C_PORT</text>
                  <text x="64" y="724">Reply-From:</text>
                  <text x="144" y="740">cri'coap://S2_ADDR:S2_PORT'</text>
                  <text x="136" y="788">/</text>
                  <text x="156" y="788">At</text>
                  <text x="176" y="788">t</text>
                  <text x="192" y="788">=</text>
                  <text x="216" y="788">60,</text>
                  <text x="240" y="788">P</text>
                  <text x="272" y="788">stops</text>
                  <text x="336" y="788">accepting</text>
                  <text x="168" y="804">responses</text>
                  <text x="224" y="804">for</text>
                  <text x="260" y="804">this</text>
                  <text x="312" y="804">request</text>
                  <text x="352" y="804">/</text>
                  <text x="264" y="820">|</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
C                               P                      S1           S2
|                               |                      |             |
+------------------------------>|                      |             |
| Src: C_ADDR:C_PORT            |                      |             |
| Dst: P_ADDR:P_PORT            |                      |             |
| Proxi-Uri:                    |                      |             |
|   "coap://G_ADDR:G_PORT/r"    |                      |             |
| Multicast-Timeout: 60         |                      |             |
|                               |                      |             |
|                               |                      |             |
|                               | Src: P_ADDR:P_PORT   |             |
|                               | Dst: G_ADDR:G_PORT   |             |
|                               | Uri-Path: "r"        |             |
|                               +---------------+----->|             |
|                               |                \     |             |
|                               |                 `----------------->|
|                               |                      |             |
|                               |                      |             |
|                               | / t = 0 : P starts   |             |
|                               | accepting responses  |             |
|                               | for this request /   |             |
|                               |                      |             |
|                               |                      |             |
|                               |<---------------------+             |
|                               | Src: S1_ADDR:G_PORT  |             |
|                               | Dst: P_ADDR:P_PORT   |             |
|                               |                      |             |
|                               |                      |             |
|<------------------------------+                      |             |
| Src: P_ADDR:P_PORT            |                      |             |
| Dst: C_ADDR:C_PORT            |                      |             |
| Reply-From:                   |                      |             |
|   cri'coap://S1_ADDR:G_PORT'  |                      |             |
|                               |                      |             |
|                               |                      |             |
|                               |<-----------------------------------+
|                               |               Src: S2_ADDR:S2_PORT |
|                               |               Dst: P_ADDR:P_PORT   |
|                               |                      |             |
|                               |                      |             |
|<------------------------------+                      |             |
| Src: P_ADDR:P_PORT            |                      |             |
| Dst: C_ADDR:C_PORT            |                      |             |
| Reply-From:                   |                      |             |
|   cri'coap://S2_ADDR:S2_PORT' |                      |             |
|                               |                      |             |
|                               |                      |             |
|               / At t = 60, P stops accepting         |             |
|               responses for this request /           |             |
|                               |                      |             |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="sec-reverse-proxies">
      <name>Reverse-Proxies</name>
      <t>The use of reverse-proxies in group communication scenarios is defined in <xref section="3.5.2" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>.</t>
      <t>This section clarifies how the Multicast-Timeout Option is effective also in such a context, in order for:</t>
      <ul spacing="normal">
        <li>
          <t>The proxy to effectively reveal itself as a reverse-proxy to the client.</t>
        </li>
        <li>
          <t>The client to indicate to the proxy of being aware that it is communicating with a reverse-proxy and for how long it is willing to receive responses to a proxied group request.</t>
        </li>
      </ul>
      <t>This practically addresses the additional issues compared to the case with a forward-proxy, as compiled in <xref section="F" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>.</t>
      <t><xref target="sec-reverse-proxies-examples"/> provides examples with a reverse-proxy.</t>
      <section anchor="sec-reverse-proxies-proxy-side">
        <name>Processing on the Proxy Side</name>
        <t>If the proxy receives a CoAP request and determines that it should be forwarded to a group of servers over IP multicast, then the proxy performs the steps defined in <xref target="ssec-req-proc-proxy"/>.</t>
        <t>In particular, when such a request does not include a Multicast-Timeout Option, the proxy effectively reveals itself as a reverse-proxy, by replying with a 4.00 (Bad Request) response including a Multicast-Timeout Option with value 0 (which is ultimately represented with an empty option value).</t>
        <t>The proxy processes the CoAP responses forwarded back to the client as defined in <xref target="ssec-resp-proc-proxy"/>, with the following additions.</t>
        <ul spacing="normal">
          <li>
            <t>As a first possible case, the proxy stands in both for the whole group of servers and for the individual origin servers in the group. That is, the origin client cannot reach the individual servers directly, but only through the proxy.  </t>
            <t>
In such a case, within a response forwarded back to the client, the value of the Reply-From Option specifies an addressing information TARGET that is directly associated with the proxy. The addressing information is such that, when receiving a unicast request that has been sent according to what is specified in TARGET, the proxy forwards the request to the origin server that generated the response. In particular, the proxy sets the option value as follows.  </t>
            <ul spacing="normal">
              <li>
                <t>The CRI that is present as the first element of the CBOR sequence specifies an addressing information TARGET_1, such that a unicast request reaches the proxy if it is sent according to TARGET_1.</t>
              </li>
              <li>
                <t>A CRI reference <bcp14>MUST</bcp14> be present as the second element of the CBOR sequence in case, upon receiving a unicast request that has been sent according to TARGET_1, the proxy forwards the request based on what is specified by the Uri-Host, Uri-Port, and Uri-Path Options included in the request. The CRI reference specifies the same information that the proxy expects to be specified in the Uri-Host, Uri-Port, and Uri-Path Options of such a unicast request.      </t>
                <t>
Otherwise, the second element of the CBOR sequence <bcp14>MUST NOT</bcp14> be present, in which case the proxy forwards the unicast request solely based on the addressing information TARGET_1 according to which the request has been sent to.</t>
              </li>
            </ul>
            <t>
The client will be able to communicate individually with the origin server that generated the response, by sending a follow-up unicast request to the proxy at the specified addressing information TARGET, according to which the proxy forwards the request to that server. This is further specified in <xref target="sec-reverse-proxies-client-side"/>. Examples are provided in <xref target="sec-reverse-proxies-examples-ex1"/> and <xref target="sec-reverse-proxies-examples-ex2"/>.</t>
          </li>
          <li>
            <t>As a second possible case, the proxy stands in only for the whole group of servers, but not for the individual servers in the group. That is, the origin client can reach the individual servers directly, without recourse to the proxy.  </t>
            <t>
In such a case, within a response forwarded back to the client, the value of the Reply-From Option specifies an addressing information TARGET that is directly associated with the origin server that generated the response. In particular, the proxy sets the option value as follows.  </t>
            <ul spacing="normal">
              <li>
                <t>The CRI present as the first element of the CBOR sequence specifies the addressing information TARGET, such that a unicast request reaches the origin server if sent according to TARGET.</t>
              </li>
              <li>
                <t>The second element of the CBOR sequence <bcp14>MUST NOT</bcp14> be present.</t>
              </li>
            </ul>
            <t>
The client will be able to use that information for sending a follow-up unicast request directly to that server, i.e., bypassing the proxy. This is further specified in <xref target="sec-reverse-proxies-client-side"/>. An example is provided in <xref target="sec-reverse-proxies-examples-ex3"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-reverse-proxies-client-side">
        <name>Processing on the Client Side</name>
        <t>If a client sends a CoAP request intended for a group of servers and is aware of actually communicating with a reverse-proxy, then the client <bcp14>MUST</bcp14> perform the steps defined in <xref target="ssec-req-send-steps"/>. In particular, this results in a request sent to the proxy including a Multicast-Timeout Option.</t>
        <t>The client processes the CoAP responses forwarded back by the proxy as defined in <xref target="ssec-resp-proc-client-steps"/>, with the following differences at Step 3.</t>
        <ul spacing="normal">
          <li>
            <t>If the client wishes to send a follow-up unicast request intended only to the origin server that generated the response, then the client sends such a request according to the addressing information specified by the CRI retrieved from the value of the Reply-From Option.  </t>
            <t>
Effectively, the client sends the unicast request either directly to the origin server (in case the proxy stands in only for the whole group of servers, but not for the individual servers in the group), or to the proxy (in case the proxy stands in for both the whole group of servers and the individual servers in the group).  </t>
            <t>
In case the value of the Reply-From Option specifies also a CRI reference as the second element of the CBOR sequence, then the client includes the Uri-Host, Uri-Port, and Uri-Path Options in the unicast request, according to what is specified by the corresponding elements of the CRI reference. If the client wants to specify additional path segments that identify a specific resource at the origin server, then the corresponding Uri-Path Options are included in the request after the Uri-Path Options corresponding to the path component of the CRI reference.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-proxy-caching">
      <name>Caching</name>
      <t>A proxy <bcp14>MAY</bcp14> cache responses to a group request, as defined in <xref section="5.7.1" sectionFormat="of" target="RFC7252"/>. In particular, the same rules apply to determine the set of request options used as "Cache-Key" and to determine the max-age values offered for responses served from the cache.</t>
      <t>A cache entry is associated with one server and stores one response from that server, regardless of whether it is a response to a unicast request or to a group request. The following two types of requests can produce a hit to a cache entry.</t>
      <ul spacing="normal">
        <li>
          <t>A matching request intended for that server, i.e., to the corresponding unicast URI.  </t>
          <t>
When the stored response is a response to a unicast request to the server, the unicast URI of the matching request is the same target URI used for the original unicast request.  </t>
          <t>
When the stored response is a response to a group request to the CoAP group, the unicast URI of the matching request is the target URI obtained by replacing the authority component of the group URI in the original group request with the transport-layer source address and port number of the response.</t>
        </li>
        <li>
          <t>A matching group request intended for the CoAP group, i.e., to the corresponding group URI.  </t>
          <t>
That is, a matching group request produces a hit to multiple cache entries, each of which is associated with one of the CoAP servers in the CoAP group.  </t>
          <t>
Note that, as per the freshness model defined in <xref target="sec-proxy-caching-freshness"/>, the proxy might serve a group request exclusively from its cached responses only when it knows all the CoAP servers that are current members of the CoAP group and it has a valid cache entry for each of them.</t>
        </li>
      </ul>
      <t>When forwarding a GET or FETCH group request to the servers in the CoAP group, the proxy behaves like a CoAP client as defined in <xref section="3.2" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, with the following additions.</t>
      <ul spacing="normal">
        <li>
          <t>As discussed in <xref target="ssec-resp-proc-proxy-steps"/>, the proxy can receive multiple responses to the same group request from the same origin server and forwards them back to the origin client "as they come". When this happens, each of such multiple responses is stored in the cache entry associated with the server "as it comes", possibly replacing an already stored response from that server.</t>
        </li>
        <li>
          <t>As discussed in <xref target="sec-group-caching"/>, when communications in the group are secured with Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>, additional means are required to enable cacheability of responses at the proxy.</t>
        </li>
      </ul>
      <t>The following subsections define the freshness model and validation model that the proxy uses for cached responses.</t>
      <section anchor="sec-proxy-caching-freshness">
        <name>Freshness Model</name>
        <t>The proxy relies on the same freshness model defined in <xref section="3.2.1" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>, by taking the role of a CoAP client with respect to the servers in the CoAP group.</t>
        <t>In particular, when receiving a unicast group request from the client, the proxy <bcp14>MAY</bcp14> serve it by using exclusively cached responses without forwarding the group request to the servers in the CoAP group, but only if both the following conditions hold:</t>
        <ul spacing="normal">
          <li>
            <t>The proxy knows all the CoAP servers that are currently members of the CoAP group for which the group request is intended.</t>
          </li>
          <li>
            <t>The proxy's cache currently stores a fresh response for each of those CoAP servers.</t>
          </li>
        </ul>
        <t>The specific way that the proxy uses to determine the CoAP servers currently members of the target CoAP group is out of scope for this document. As possible examples, the proxy can synchronize with a group manager server; rely on well-known time patterns used by the application or in the network for the addition of new CoAP group members; observe group join requests or IGMP/MLD multicast group join messages, e.g., if the proxy is embedded in a multicast router.</t>
        <t>When forwarding the group request to the servers, the proxy may have fresh responses stored in its cache for (some of) those servers. In such a case, the proxy uses (also) those cached responses to serve the original unicast group request, as defined below.</t>
        <ul spacing="normal">
          <li>
            <t>The request processing in <xref target="ssec-req-proc-proxy-steps"/> is extended as follows.  </t>
            <t>
After setting the timeout with value T' &gt; 0 in Step 6, the proxy checks whether its cache currently stores fresh responses to the group request. For each of such responses, the proxy compares the residual lifetime L of the corresponding cache entry against the value T'.  </t>
            <t>
If a cached response X is such that L &lt; T', then the proxy forwards X back to the client at its earliest convenience. Otherwise, the proxy does not forward X back to the client right away and instead waits for approaching the timeout expiration, as discussed in the next point.</t>
          </li>
          <li>
            <t>The response processing in <xref target="ssec-resp-proc-proxy-steps"/> is extended as follows.  </t>
            <t>
Before the timeout with original value T' &gt; 0 expires and the proxy stops accepting responses to the group request, the proxy checks whether it stores in its cache any fresh response X to the group request such that both the following conditions hold:  </t>
            <ul spacing="normal">
              <li>
                <t>The cache entry E storing X was already existing when the proxy forwarded the group request.</t>
              </li>
              <li>
                <t>The proxy has received no response to the forwarded group request from the server associated with E.</t>
              </li>
            </ul>
            <t>
Then, the proxy sends back to the client each response X stored in its cache and selected as above, before the timeout expires.  </t>
            <t>
Note that, from the forwarding of the group request until the timeout expiration, the proxy still forwards responses to the group request back to the client "as they come" (see <xref target="ssec-resp-proc-proxy-steps"/>). Also, such responses possibly refresh older responses from the same servers that the proxy has stored in its cache, as defined earlier in <xref target="sec-proxy-caching"/>.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-proxy-caching-validation">
        <name>Validation Model</name>
        <t>This section defines the revalidation of responses, separately between the proxy and the origin servers as well as between the origin client and the proxy.</t>
        <section anchor="sec-proxy-caching-validation-p-s-unicast">
          <name>Proxy-Servers Revalidation with Unicast Requests</name>
          <t>The proxy <bcp14>MAY</bcp14> revalidate a cached response by making a GET or FETCH request on the related unicast request URI, i.e., by taking the role of a CoAP client with respect to a server in the CoAP group.</t>
          <t>As discussed in <xref target="sec-group-caching"/>, this is however not possible for the proxy if communications in the group are secured end-to-end between origin client and origin servers by using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>[ TODO</t>
          <t>It can be actually possible to enable revalidation of responses between proxy and server, also in this case where Group OSCORE is used end-to-end between client and origin servers.</t>
          <t>Fundamentally, this requires to define the possible use of the ETag Option also as an outer option for OSCORE. Thus, in addition to the normal inner ETag, a server can add also an outer ETag option intended for the proxy.</t>
          <t>Since validation of responses assumes that cacheability of responses is possible in the first place, it would be convenient to define the use of ETag as outer option in <xref target="I-D.amsuess-core-cachable-oscore"/>.</t>
          <t>In case OSCORE is also used between the proxy and an individual origin server as per <xref target="I-D.ietf-core-oscore-capable-proxies"/>, then the outer ETag Option would be seamlessly protected with the OSCORE Security Context shared between the proxy and the origin server.</t>
          <t>The following text can be used to replace the last paragraph above.</t>
          <t><br/></t>
          <t>As discussed in <xref target="sec-group-caching"/>, the following applies when Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> is used to secure communications end-to-end between the origin client and the origin servers in the group.</t>
          <ul spacing="normal">
            <li>
              <t>Additional means are required to enable cacheability of responses at the proxy (see <xref target="sec-det-req"/>).</t>
            </li>
            <li>
              <t>If a cached response included an outer ETag Option intended for the proxy, then the proxy can perform revalidation of the cached response, by making a request to the unicast URI targeting the server, and including outer ETag Option(s).  </t>
              <t>
This is possible also in case the proxy and the origin server use OSCORE to further protect the exchanged request and response, as defined in <xref target="I-D.ietf-core-oscore-capable-proxies"/>. In such a case, the originally outer ETag Option is protected with the OSCORE Security Context shared between the proxy and the origin server, before transferring the message over the communication leg between the proxy and origin server.</t>
            </li>
          </ul>
          <t>]</t>
        </section>
        <section anchor="sec-proxy-caching-validation-p-s">
          <name>Proxy-Servers Revalidation with Group Requests</name>
          <t>When forwarding a group request to the servers in the CoAP group, the proxy <bcp14>MAY</bcp14> revalidate one or more stored responses that it has cached.</t>
          <t>To this end, the proxy relies on the same validation model defined in <xref section="3.2.2" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/> and using the ETag Option, by taking the role of a CoAP client with respect to the servers in the CoAP group.</t>
          <t>As discussed in <xref target="sec-group-caching"/>, this is however not possible for the proxy if communications in the group are secured end-to-end between origin client and origin servers by using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
          <t>[ TODO</t>
          <t>See the notes in <xref target="sec-proxy-caching-validation-p-s-unicast"/>.</t>
          <t>The following text can be used to replace the last paragraph above.</t>
          <t><br/></t>
          <t>As discussed in <xref target="sec-group-caching"/>, the following applies when Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> is used to secure communications end-to-end between the origin client and the origin servers in the group.</t>
          <ul spacing="normal">
            <li>
              <t>Additional means are required to enable cacheability of responses at the proxy (see <xref target="sec-det-req"/>).</t>
            </li>
            <li>
              <t>If a cached response included an outer ETag Option intended for the proxy, then the proxy can perform revalidation of the cached response, by making a request to the group URI targeting the CoAP group, and including outer ETag Option(s).  </t>
              <t>
This is possible also in case the proxy and the origin servers use Group OSCORE to further protect the exchanged request and response, as defined in <xref target="I-D.ietf-core-oscore-capable-proxies"/>. In such a case, the originally outer ETag Option is protected with the Group OSCORE Security Context shared between the proxy and the origin server, before transferring the message over the communication leg between the proxy and origin server.</t>
            </li>
          </ul>
          <t>]</t>
        </section>
      </section>
      <section anchor="sec-proxy-caching-validation-c-p">
        <name>Client-Proxy Revalidation with Group Requests</name>
        <t>A client <bcp14>MAY</bcp14> revalidate the full set of responses to a group request by leveraging the corresponding cache entries at the proxy. To this end, this document defines the new Group-ETag Option.</t>
        <t>The Group-ETag Option has the properties summarized in <xref target="_table-response-group-etag-option"/>, which extends Table 4 of <xref target="RFC7252"/>.</t>
        <t>The Group-ETag Option is elective, safe to forward, part of the cache key, and repeatable. The option is intended for group requests sent to a proxy to be forwarded to the servers in a CoAP group as well as for the associated responses.</t>
        <table align="center" anchor="_table-response-group-etag-option">
          <name>The Group-ETag Option. C=Critical, U=Unsafe, N=NoCacheKey, R=Repeatable</name>
          <thead>
            <tr>
              <th align="left">No.</th>
              <th align="left">C</th>
              <th align="left">U</th>
              <th align="left">N</th>
              <th align="left">R</th>
              <th align="left">Name</th>
              <th align="left">Format</th>
              <th align="left">Length</th>
              <th align="left">Default</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD3</td>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left"> </td>
              <td align="left">x</td>
              <td align="left">Group-ETag</td>
              <td align="left">opaque</td>
              <td align="left">1-8</td>
              <td align="left">(none)</td>
            </tr>
          </tbody>
        </table>
        <t>The Group-ETag Option has the same properties of the ETag Option defined in <xref section="5.10.6" sectionFormat="of" target="RFC7252"/>.</t>
        <t>The Group-ETag Option is of class U in terms of OSCORE processing (see <xref section="4.1" sectionFormat="of" target="RFC8613"/>).</t>
        <t>A proxy <bcp14>MUST NOT</bcp14> provide this form of validation if it is not in a position to serve a group request by using exclusively cached responses, i.e., without sending the group request to the servers in the CoAP group (see <xref target="sec-proxy-caching-freshness"/>).</t>
        <t>If the proxy supports this form of response revalidation, the following applies.</t>
        <ul spacing="normal">
          <li>
            <t>The proxy defines J as a joint set including all the cache entries currently storing fresh responses that satisfy a group request. A set J is "complete" if it includes a valid cache entry for each of the CoAP servers currently members of the CoAP group.</t>
          </li>
          <li>
            <t>When the set J becomes "complete", the proxy assigns it an entity-tag value. The proxy <bcp14>MUST</bcp14> update the current entity-tag value, when J is "complete" and one of its cache entry is updated.</t>
          </li>
          <li>
            <t>When forwarding to the client a 2.05 (Content) response to a GET or FETCH group request, the proxy <bcp14>MAY</bcp14> include one Group-ETag Option, in case the set J is "complete". Such a response <bcp14>MUST NOT</bcp14> include more than one Group-ETag Option. The option value specifies the entity-tag value currently associated with the set J.</t>
          </li>
        </ul>
        <t>When sending to the proxy a GET or FETCH request to be forwarded to the servers in the CoAP group, the client <bcp14>MAY</bcp14> include one or more Group-ETag Options. Each option specifies one entity-tag value, as applicable to the set J of cache entries that can be hit by the group request.</t>
        <t>The proxy <bcp14>MAY</bcp14> perform the following actions, in case the group request produces a hit to the cache entry of each CoAP server currently member of the CoAP group, i.e., in case the set J associated with the group request is "complete".</t>
        <ul spacing="normal">
          <li>
            <t>The proxy checks whether the current entity-tag value of the set J matches with one of the entity-tag values specified in the Group-ETag Options of the unicast group request from the client.</t>
          </li>
          <li>
            <t>In case of positive match, the proxy replies with a single 2.03 (Valid) response. This response has no payload and <bcp14>MUST</bcp14> include one Group-ETag Option, specifying the current entity-tag value of the set J.</t>
          </li>
        </ul>
        <t>That is, the 2.03 (Valid) response from the proxy indicates to the client that the stored responses identified by the entity-tag given in the response's Group-ETag Option can be reused, after updating each of them as described in <xref section="5.9.1.3" sectionFormat="of" target="RFC7252"/>. In effect, the client can determine if any of the stored representations from the respective cache entries at the proxy is current, without needing to transfer any of them again.</t>
      </section>
      <section anchor="sec-group-caching">
        <name>Caching of End-To-End Protected Responses at Proxies</name>
        <t>When using Group OSCORE <xref target="I-D.ietf-core-oscore-groupcomm"/> to protect communications end-to-end between a client and multiple servers in the group, it is normally not possible for an intermediary proxy to effectively cache protected responses.</t>
        <t>In fact, when starting from the same plain CoAP message, different clients generate different protected requests to send on the wire. This prevents different clients to generate potential cache hits and thus makes response caching at the proxy pointless.</t>
        <section anchor="sec-det-req">
          <name>Deterministic Requests to Achieve Cacheability</name>
          <t>For application scenarios that use secure group communication, it is still possible to achieve cacheability of responses at proxies by using the approach defined in <xref target="I-D.amsuess-core-cachable-oscore"/>, which is based on Deterministic Requests protected with the pairwise mode of Group OSCORE. This approach is limited to group requests that are safe (in the RESTful sense) to process and do not yield side effects at the servers. As for any protected group request, it requires the clients and all the servers in the CoAP group to have already joined the correct OSCORE group.</t>
          <t>Starting from the same plain CoAP request, this allows different clients in the OSCORE group to deterministically generate the same request protected with Group OSCORE, which is sent to the proxy for being forwarded to the CoAP group. The proxy can now effectively cache the resulting responses from the servers in the CoAP group, since the same plain CoAP request will result again in the same Deterministic Request and thus will produce a cache hit.</t>
          <t>When caching of Group OSCORE secured responses is enabled at the proxy, the same as defined in <xref target="sec-proxy-caching"/> applies, with respect to cache entries and their lifetimes.</t>
          <t>Note that different Deterministic Requests result in different cache entries at the proxy. This includes the case where different plain group requests differ only in their set of ETag Options, as defined in <xref section="3.2.2" sectionFormat="of" target="I-D.ietf-core-groupcomm-bis"/>.</t>
          <t>That is, even though the servers would produce the same plain CoAP responses when replying to two different Deterministic Requests, those will result in different protected responses to each respective Deterministic Request, hence in different cache entries at the proxy.</t>
          <t>Thus, given a plain group request, a client needs to reuse the same set of ETag Options in order to send that group request as a Deterministic Request that can actually produce a cache hit at the proxy. However, while this would prevent the caching at the proxy from being inefficient and unnecessarily redundant, it would also limit the flexibility of end-to-end response revalidation for a client.</t>
        </section>
        <section anchor="chap-sec-group-caching-validation">
          <name>Validation of Responses</name>
          <t>Response revalidation remains possible end-to-end between the client and the servers in the group, by including inner ETag Options as defined in Sections <xref target="I-D.ietf-core-groupcomm-bis" section="3.2" sectionFormat="bare"/> and <xref target="I-D.ietf-core-groupcomm-bis" section="3.2.2" sectionFormat="bare"/> of <xref target="I-D.ietf-core-groupcomm-bis"/>.</t>
          <t>Furthermore, it remains possible for a client to attempt revalidating responses to a group request from a "complete" set of cache entries at the proxy, by using the Group-ETag Option as defined in <xref target="sec-proxy-caching-validation-c-p"/>.</t>
          <t>When directly interacting with the servers in the CoAP group to refresh its cache entries, the proxy cannot rely on response revalidation anymore. This applies to the case where the request is addressed to a single server and sent to the related unicast URI (see <xref target="sec-proxy-caching-validation-p-s-unicast"/>) as well as to the case where the request is a group request addressed to the CoAP group and sent to the related group URI (see <xref target="sec-proxy-caching-validation-p-s"/>).</t>
          <t>[ TODO</t>
          <t>See the notes in <xref target="sec-proxy-caching-validation-p-s-unicast"/>.</t>
          <t>The following text can be used to replace the last paragraph above.</t>
          <t><br/></t>
          <t>When directly interacting with the servers in the CoAP group to refresh its cache entries, the proxy also remains able to perform response revalidation. That is, if a cached response included an outer ETag Option intended for the proxy, then the proxy can perform revalidation of the cached response, by making a request to the unicast URI addressed to a single server and sent to the related unicast URI (see <xref target="sec-proxy-caching-validation-p-s-unicast"/>) or a group request addressed to the CoAP group and sent to the related group URI (see <xref target="sec-proxy-caching-validation-p-s"/>).</t>
          <t>]</t>
        </section>
      </section>
    </section>
    <section anchor="sec-proxy-chain">
      <name>Chain of Proxies</name>
      <t>A client may be interested to access a resource at a group of origin servers that is reached through a chain of two or more proxies.</t>
      <t>That is, these proxies are configured into a chain, where each non-last proxy is configured to forward (group) requests to the next hop towards the origin servers. Also, each non-first proxy is configured to forward back responses to the previous hop proxy towards the origin client.</t>
      <t>This section specifies how the signaling protocol defined in <xref target="sec-description"/> is used in that setting. Except for the last proxy before the origin servers, every other proxy in the chain takes the role of client with respect to the next hop towards the origin servers. Also, every proxy in the chain except the first takes the role of server towards the previous proxy closer to the origin client.</t>
      <t>Accordingly, possible caching of responses at each proxy works as defined in <xref target="sec-proxy-caching"/> and <xref target="sec-group-caching"/>. Also, possible revalidation of responses cached at each proxy and based on the Group-ETag Option works as defined in <xref target="sec-proxy-caching-validation-c-p"/> and <xref target="chap-sec-group-caching-validation"/>.</t>
      <t>The requirements REQ1 and REQ2 defined in <xref target="sec-objectives"/> <bcp14>MUST</bcp14> be fulfilled for each proxy in the chain. That is, every proxy in the chain has to be explicitly configured with an allow-list that allows proxied group requests from specific senders and <bcp14>MUST</bcp14> identify those senders upon receiving their group request. For the first proxy in the chain, that sender is the origin client. For each other proxy in the chain, that sender is the previous hop proxy closer to the origin client. In either case, a proxy can identify the sender of a group request by the same means mentioned in <xref target="sec-objectives"/>.</t>
      <section anchor="sec-proxy-chain-request-processing">
        <name>Request Processing at the Proxy</name>
        <t>Upon receiving a group request to be forwarded to a CoAP group URI, a proxy proceeds as follows.</t>
        <t>If the proxy is the last one in the chain, i.e., it is the last hop before the origin servers, the proxy performs the steps defined in <xref target="ssec-req-proc-proxy"/>, with no modifications.</t>
        <t>Otherwise, the proxy performs the steps defined in <xref target="ssec-req-proc-proxy"/>, with the following differences.</t>
        <ul spacing="normal">
          <li>
            <t>At Steps 1-3, "client" refers to the origin client when the proxy is the first one in the chain, or to the previous hop proxy closer to the origin client otherwise.</t>
          </li>
          <li>
            <t>At Step 4, the proxy rather performs the following actions.  </t>
            <ol spacing="normal" type="1"><li>
                <t>The proxy retrieves the value T' from the Multicast-Timeout Option and does not remove the option.</t>
              </li>
              <li>
                <t>In case T' &gt; 0, the proxy picks an amount of time T that it is fine to wait for before freeing up its local Token value to use with the next hop towards the origin servers. To this end, the proxy <bcp14>MUST</bcp14> follow what is defined at Step 2 of <xref target="ssec-req-send-steps"/> for the origin client, with the following differences.      </t>
                <ul spacing="normal">
                  <li>
                    <t>T <bcp14>MUST</bcp14> be greater than the retrieved value T', i.e., T' &lt; T.</t>
                  </li>
                  <li>
                    <t>The worst-case message processing time takes into account all the next hops towards the origin servers, as well as the origin servers themselves.</t>
                  </li>
                  <li>
                    <t>The worst-case round-trip delay takes into account all the legs between the proxy and the origin servers.</t>
                  </li>
                </ul>
              </li>
              <li>
                <t>In case T' &gt; 0, the proxy replaces the value of the Multicast-Timeout Option with a new value T'', such that:      </t>
                <ul spacing="normal">
                  <li>
                    <t>T'' &lt; T. The difference (T - T'') should be at least the expected worst-case round-trip time between the proxy and the next hop towards the origin servers; and</t>
                  </li>
                  <li>
                    <t>T'' &lt; T'. The difference (T' - T'') should be at least the expected worst-case round-trip time between the proxy and the (previous hop proxy closer to the) origin client.</t>
                  </li>
                </ul>
                <t>
If the proxy is not able to determine a value T'' that fulfills both the requirements above, the proxy <bcp14>MUST</bcp14> stop processing the request and <bcp14>MUST</bcp14> respond with a 5.05 (Proxying Not Supported) error response to the (previous hop proxy closer to the) origin client. The proxy <bcp14>SHOULD</bcp14> include a Multicast-Timeout Option, set to the minimum value T' that would be acceptable in the Multicast-Timeout Option of a group request to forward.      </t>
                <t>
If the proxy is the first one in the chain, then the error response is sent to the origin client. Upon receiving the error response, the origin client <bcp14>MAY</bcp14> send an updated group request to the same first proxy in the chain. In the updated request, the Multicast-Timeout Option <bcp14>SHOULD</bcp14> specify a value T' such that: it is greater than the one specified in the original group request; and it is greater than or equal to the one specified in the error response (if present therein).      </t>
                <t>
Otherwise, upon receiving the error response, any other proxy in the chain <bcp14>MAY</bcp14> send an updated group request to the next hop towards the origin servers. In the updated group request, the Multicast-Timeout Option <bcp14>MUST</bcp14> specify a value T' such that: it is greater than the one specified in the previous forwarded request; and it is greater than or equal to the one specified in the error response (if present therein). If the proxy does not send an updated group request, the proxy <bcp14>MUST</bcp14> also send a 5.05 (Proxying Not Supported) error response to the previous hop proxy closer to the origin client. Like the received one, also this error response <bcp14>SHOULD</bcp14> include a Multicast-Timeout Option, set to the minimum value T' acceptable by the proxy sending the error response.</t>
              </li>
            </ol>
          </li>
          <li>
            <t>At Step 5, the proxy forwards the request to the next hop towards the origin servers.</t>
          </li>
          <li>
            <t>At Step 6, the proxy sets a timeout with the value T' retrieved from the
Multicast-Timeout Option of the request received from the (previous hop proxy closer to the) origin client.  </t>
            <t>
In case T' &gt; 0, the proxy will ignore responses to the forwarded group request coming from the next hop towards the origin servers, if received after the timeout expiration, with the exception of Observe notifications (see <xref target="ssec-resp-proc-proxy"/>).  </t>
            <t>
In case T' = 0, the proxy will ignore all responses to the forwarded group request coming from the next hop towards the origin servers.</t>
          </li>
        </ul>
        <section anchor="sec-proxy-chain-request-processing-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, what is defined in <xref target="ssec-req-proc-proxy-observe"/> applies for the last proxy in the chain, i.e., the last hop before the origin servers.</t>
          <t>Any other proxy in the chain acts as a client and registers its own interest to observe the target resource with the next hop towards the origin servers, as per <xref section="5" sectionFormat="of" target="RFC7641"/>.</t>
        </section>
        <section anchor="ssec-cancel-forwarding-proxy-chain">
          <name>Cancellation of Ongoing Response Forwarding</name>
          <t>Consistently with what is described in <xref target="ssec-cancel-forwarding-proxy"/>, a proxy might be asked by the (previous hop proxy closer to the) origin client for an early stop of the ongoing response forwarding.</t>
          <t>That is, the proxy is asked to stop forwarding to the (previous hop proxy closer to the) origin client any further responses received to the forwarded group request from the (next hop proxy towards the) origin servers.</t>
          <t>When this happens, the proxy proceeds as described in <xref target="ssec-cancel-forwarding-proxy"/>. Furthermore, if the proxy is not the last one in the chain, the proxy <bcp14>MAY</bcp14> send to the next hop proxy towards the origin servers an Early Stop Request (see <xref target="ssec-req-proc-proxy-steps"/>), with the same Token value of the group request that the proxy forwarded to the next hop proxy towards the origin servers.</t>
        </section>
      </section>
      <section anchor="sec-proxy-chain-response-processing">
        <name>Response Processing at the Proxy</name>
        <t>Upon receiving a response matching with the group request before the amount of time T' has elapsed, the proxy proceeds as follows.</t>
        <t>If the proxy is the last one in the chain, i.e., it is the last hop before the origin servers, the proxy performs the steps defined in <xref target="ssec-resp-proc-proxy"/> if it is a forward-proxy or in <xref target="sec-reverse-proxies-proxy-side"/> if it is a reverse-proxy, with no modifications.</t>
        <t>Otherwise, the proxy performs the steps defined in <xref target="ssec-resp-proc-proxy"/>, with the following differences.</t>
        <ul spacing="normal">
          <li>
            <t>In any of the two following cases, the proxy skips Step 1, hence the proxy <bcp14>MUST NOT</bcp14> remove, alter, or replace the Reply-From Option.  </t>
            <ul spacing="normal">
              <li>
                <t>The chain is composed of forward-proxies.</t>
              </li>
              <li>
                <t>The chain is composed of reverse-proxies and the last reverse-proxy (in fact, the whole chain) stands in only for the whole group of servers, but not for the individual servers in the group (see <xref target="sec-reverse-proxies-proxy-side"/>).</t>
              </li>
            </ul>
            <t>
This ensures that, when receiving a response to a group request and consuming the Reply-From Option, the origin client can retrieve addressing information that is directly associated with the origin server that generated the response.</t>
          </li>
          <li>
            <t>At Step 1, the following applies in case the chain is composed of reverse-proxies and, at the same time, the last reverse-proxy (in fact, the whole chain) stands in both for the whole group of servers and for the individual origin servers in the group (see <xref target="sec-reverse-proxies-proxy-side"/>).  </t>
            <t>
In the Reply-From Option, the proxy <bcp14>MUST</bcp14> replace the old value TARGET_OLD. The new value TARGET_NEW specifies addressing information directly associated with the proxy. The new value is such that, when receiving a unicast request that has been sent according to what is specified in TARGET_NEW, the proxy forwards the request according to what was specified in TARGET_OLD, i.e., to the next hop towards the origin server that generated the response.  </t>
            <t>
This ensures that, when receiving a response to a group request and consuming the Reply-From Option, the origin client can retrieve addressing information that is directly associated with the first reverse-proxy in the chain, i.e., with the next hop towards the origin server that generated the response.</t>
          </li>
          <li>
            <t>At Step 2, "client" refers to the origin client when the proxy is the first one in the chain, or to the previous hop proxy closer to the origin client otherwise.</t>
          </li>
        </ul>
        <t>As to the possible reception of multiple responses to the same group request from the same (next hop proxy towards the) origin server, the same as defined in <xref target="ssec-resp-proc-proxy-steps"/> applies. That is, as long as the proxy forwards responses to a group request back to the (previous hop proxy closer to the) origin client, the proxy <bcp14>MUST</bcp14> follow the steps above and forward also such multiple responses "as they come".</t>
        <t>Upon timeout expiration, i.e., T' seconds after having forwarded the group request to the next hop towards the origin servers, the proxy frees up its local Token value associated with that request. Thus, following late responses to the same group request will be discarded and not forwarded back to the (previous hop proxy closer to the) origin client.</t>
        <section anchor="sec-proxy-chain-response-processing-observe">
          <name>Supporting Observe</name>
          <t>When using CoAP Observe <xref target="RFC7641"/>, what is defined in <xref target="ssec-resp-proc-proxy-observe"/> applies for the last proxy in the chain, i.e., the last hop before the origin servers.</t>
          <t>As to any other proxy in the chain, the following applies.</t>
          <ul spacing="normal">
            <li>
              <t>The proxy acts as a client registered with the next hop towards the origin servers, as described earlier in <xref target="sec-proxy-chain-request-processing-observe"/>.</t>
            </li>
            <li>
              <t>The proxy takes the role of a server when forwarding notifications from the next hop towards the origin servers back to the (previous hop proxy closer to the) origin client, as per <xref section="5" sectionFormat="of" target="RFC7641"/>.</t>
            </li>
            <li>
              <t>The proxy frees up its Token value used for a group observation only if, after the timeout expiration, no 2.xx (Success) responses matching with the group request and also including an Observe Option have been received from the next hop towards the origin servers.  </t>
              <t>
Otherwise, after the timeout expiration and as long as the observation for the target resource of the group request is active with the next hop towards the origin servers in the group, notifications from that hop are forwarded back to the (previous hop proxy closer to the) origin client, as defined in <xref target="sec-proxy-chain-response-processing"/>.</t>
            </li>
            <li>
              <t>The proxy <bcp14>SHOULD</bcp14> regularly verify that the (previous hop proxy closer to the) origin client is still interested in receiving observe notifications for a group observation. To this end, the proxy can rely on the same approach defined in <xref section="4.5" sectionFormat="of" target="RFC7641"/>.</t>
            </li>
          </ul>
        </section>
      </section>
    </section>
    <section anchor="sec-http-to-coap-proxies">
      <name>HTTP-to-CoAP Proxies</name>
      <t>This section defines the components needed to use the signaling protocol specified in this document, when an HTTP client wishes to send a group request to the servers of a CoAP group via an HTTP-to-CoAP cross-proxy.</t>
      <t>The following builds on the mapping of the CoAP request/response model to HTTP and vice versa as defined in <xref section="10" sectionFormat="of" target="RFC7252"/>, as well as on the additional details about the HTTP-to-CoAP mapping defined in <xref target="RFC8075"/>.</t>
      <t>Furthermore, the components defined in <xref section="11" sectionFormat="of" target="RFC8613"/> are used to map and transport OSCORE-protected messages over HTTP. This allows an HTTP client to use Group OSCORE end-to-end with the servers in the CoAP group.</t>
      <section anchor="sec-multicast-timeout-header">
        <name>The HTTP Multicast-Timeout Header Field</name>
        <t>The HTTP Multicast-Timeout header field (see <xref target="iana-message-headers"/>) is used for carrying the content otherwise specified in the CoAP Multicast-Timeout Option defined in <xref target="sec-multicast-timeout-option"/>.</t>
        <t>Using the Augmented Backus-Naur Form (ABNF) notation of <xref target="RFC5234"/> and including the core ABNF syntax rule DIGIT (decimal digits) defined by that specification, the HTTP Multicast-Timeout header field value is as follows.</t>
        <t>Multicast-Timeout = *DIGIT</t>
        <t>The empty header field is equivalent to the header field conveying the value 0.</t>
        <t>When translating a CoAP message into an HTTP message, the HTTP Multicast-Timeout header field is set with the content of the CoAP Multicast-Timeout Option, or is left empty in case the option is empty.</t>
        <t>When translating an HTTP message into a CoAP message, the CoAP Multicast-Timeout Option is set with the content of the HTTP Multicast-Timeout header field, or is left empty in case the header field is empty.</t>
      </section>
      <section anchor="sec-reply-from-header">
        <name>The HTTP Reply-From Header Field</name>
        <t>The HTTP Reply-From header field (see <xref target="iana-message-headers"/>) is used for carrying the content otherwise specified in the CoAP Reply-From Option defined in <xref target="sec-reply-from-option"/>. Its use is intended only for HTTP responses.</t>
        <t>Reply-From is a List Structured Header Field <xref target="RFC9651"/>. The List <bcp14>MUST</bcp14> be composed of exactly one or two members. Each member of the List <bcp14>MUST</bcp14> be a Byte Sequence Item. Any deviation from such format <bcp14>MUST</bcp14> cause the entire header field to be ignored.</t>
        <t>The value of the header field specifies addressing information pertaining to the origin server that generated the CoAP response corresponding to the HTTP response. The client can use this information in order to send an individual request intended for that server.</t>
        <t>When translating a CoAP message into an HTTP message, the value of the HTTP Reply-From header field is built as follows.</t>
        <ul spacing="normal">
          <li>
            <t>The first Byte Sequence Item encodes the byte serialization of the first CBOR array of the CBOR sequence that is specified as value of the CoAP Reply-From Option.</t>
          </li>
          <li>
            <t>The second Byte Sequence Item encodes the byte serialization of the second CBOR array (if present) of the CBOR sequence that is specified as value of the CoAP Reply-From Option.  </t>
            <t>
If the CBOR sequence in the CoAP Reply-From Option does not include the second CBOR array, then this Byte Sequence Item <bcp14>MUST NOT</bcp14> be included in the List of the HTTP Reply-From header field.</t>
          </li>
        </ul>
        <t>When translating an HTTP message into a CoAP message, the value of the CoAP Reply-From Option is built as follows.</t>
        <ul spacing="normal">
          <li>
            <t>The first CBOR array of the CBOR sequence is obtained by decoding the first Byte Sequence Item in the List that is specified as value of the HTTP Reply-From header field.</t>
          </li>
          <li>
            <t>The second CBOR array of the CBOR sequence is obtained by decoding the second Byte Sequence Item (if present) in the List that is specified as value of the HTTP Reply-From header field.  </t>
            <t>
If the List of the HTTP Reply-From header field does not include the second Byte Sequence Item, then this second CBOR array <bcp14>MUST NOT</bcp14> be included in the CBOR sequence of the CoAP Reply-From Option.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-group-etag-header">
        <name>The HTTP Group-ETag Header Field</name>
        <t>The HTTP Group-ETag header field (see <xref target="iana-message-headers"/>) is used for carrying the content otherwise specified in the CoAP Group-ETag Option defined in <xref target="sec-proxy-caching-validation-c-p"/>.</t>
        <t>Group-ETag is a List Structured Header Field <xref target="RFC9651"/>. The List <bcp14>MUST</bcp14> be composed of one or more members in HTTP requests and by exactly one member in HTTP responses. Each member of the List <bcp14>MUST</bcp14> be a Byte Sequence Item. Any deviation from such format <bcp14>MUST</bcp14> cause the entire header field to be ignored.</t>
        <t>The value of the header field specifies a set of entity-tag values, each of which is associated with a set of cache entries at the proxy that can be hit by a group request (see <xref target="sec-proxy-caching-validation-c-p"/>).</t>
        <t>When translating a CoAP message into an HTTP message, the value of the HTTP Group-ETag header field is built as follows.</t>
        <ul spacing="normal">
          <li>
            <t>When translating a CoAP request to an HTTP request, the List of the HTTP Group-ETag header field <bcp14>MUST</bcp14> include N members, where N is the number of CoAP Group-ETag Options in the CoAP request. The i-th member of the List encodes the value specified in the i-th CoAP Group-ETag Option in the CoAP request.</t>
          </li>
          <li>
            <t>When translating a CoAP response to an HTTP response, the List of the HTTP Group-ETag header field <bcp14>MUST</bcp14> include one member, which encodes the value specified in the CoAP Group-ETag Option in the CoAP response.</t>
          </li>
        </ul>
        <t>When translating an HTTP message into a CoAP message, the value of the CoAP Group-ETag Options is built as follows.</t>
        <ul spacing="normal">
          <li>
            <t>When translating an HTTP request to a CoAP request, N CoAP Group-ETag Options are included in the CoAP request, where N is the number of members of the List of the HTTP Group-ETag header field. The value of the i-th CoAP Group-ETag Option is obtained by decoding the i-th member of the List of the HTTP Group-ETag header field.</t>
          </li>
          <li>
            <t>When translating an HTTP response to a CoAP response, one CoAP Group-ETag Option is included in the CoAP response. The value of the CoAP Group-ETag Option is obtained by decoding the only member of the List of the HTTP Group-ETag header field.</t>
          </li>
        </ul>
        <t>When sending to the HTTP-to-CoAP proxy an HTTP GET request to be translated into a CoAP GET request intended for the CoAP group, the client <bcp14>MAY</bcp14> include one HTTP Group-ETag header field in the request. The field value is a list of one or more members, each of which encodes one entity-tag value that is applicable to the set J of cache entries that can be hit by the request (see <xref target="sec-proxy-caching-validation-c-p"/>).</t>
        <t>An HTTP-to-CoAP proxy that performs the form of validation defined in <xref target="sec-proxy-caching-validation-c-p"/> proceeds like defined in <xref target="sec-proxy-caching-validation-c-p"/> for a CoAP-to-CoAP proxy, with the following differences.</t>
        <ul spacing="normal">
          <li>
            <t>When sending to the client an HTTP 200 (OK) response to an HTTP GET request that was translated into a CoAP GET request sent to the CoAP group, the proxy <bcp14>MAY</bcp14> include one HTTP Group-ETag header field in the response, in case the set J is "complete". The field value is a List composed of one member, which encodes the entity-tag value currently associated with the set J.</t>
          </li>
          <li>
            <t>When the HTTP-to-CoAP proxy receives an HTTP GET request to be translated into a CoAP GET request intended for the CoAP group and that includes an HTTP Group-ETag header field, the following applies.  </t>
            <ul spacing="normal">
              <li>
                <t>As to the entity-tag values used to check for possible cache hits, the HTTP-to-CoAP proxy obtains those values by decoding the members of the List of the HTTP Group-ETag header field in the HTTP request.</t>
              </li>
              <li>
                <t>If the same conditions for which a CoAP-to-CoAP proxy would reply with a single CoAP 2.03 (Valid) response hold, then the HTTP-to-CoAP proxy replies with a single HTTP 304 (Not Modified) response. The response <bcp14>MUST</bcp14> include one HTTP Group-ETag header field whose value is a List composed of one member, which encodes the current entity-tag value of the set J.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>An HTTP 304 (Not Modified) response from the HTTP-to-CoAP proxy indicates to the client that it is possible to reuse the stored responses identified by the entity-tag encoded by the only member of the List of the HTTP Group-ETag header field.</t>
      </section>
      <section anchor="sec-cross-proxies-client-req">
        <name>Request Sending at the Client</name>
        <t>The client proceeds according to the following steps.</t>
        <ol spacing="normal" type="1"><li>
            <t>The client prepares an HTTP request to send to the proxy via IP unicast and to be forwarded by the proxy to the targeted group of CoAP servers over IP multicast. With reference to <xref section="5" sectionFormat="of" target="RFC8075"/>, the request is addressed to a Hosting HTTP URI, such that the proxy can extract the Target CoAP URI as the group URI where to forward the request.</t>
          </li>
          <li>
            <t>The client determines the amount of time T that it is fine to wait for a response to the request from the proxy. Then, the client determines the amount of time T' &lt; T, where the difference (T - T') should be at least the expected worst-case round-trip time between the client and the proxy.</t>
          </li>
          <li>
            <t>If Group OSCORE is used end-to-end between the client and the servers, the client translates the HTTP request into a CoAP request, as per <xref target="RFC8075"/>. Then, the client protects the resulting CoAP request by using Group OSCORE, as defined in <xref target="I-D.ietf-core-oscore-groupcomm"/>. Finally, the protected CoAP request is mapped to HTTP as defined in <xref section="11.2" sectionFormat="of" target="RFC8613"/>. Later on, the resulting HTTP request <bcp14>MUST</bcp14> be sent in compliance with the rules in <xref section="11.1" sectionFormat="of" target="RFC8613"/>.</t>
          </li>
          <li>
            <t>The client includes the HTTP Multicast-Timeout header field in the request, specifying T' as its value. The client can specify T' = 0, thus indicating to be not interested in receiving responses from the origin servers through the proxy.</t>
          </li>
          <li>
            <t>If the client wishes to revalidate responses to a previous group request from the corresponding cache entries at the proxy (see <xref target="sec-proxy-caching-validation-c-p"/>), the client includes one or multiple HTTP Group-ETag header fields in the request (see <xref target="sec-group-etag-header"/>), each specifying an entity-tag value like they would in a corresponding CoAP Group E-Tag Option.</t>
          </li>
          <li>
            <t>The client sends the request to the proxy, as a unicast HTTP message. In particular, the client protects the request according to the security association that it has with the proxy.</t>
          </li>
        </ol>
      </section>
      <section anchor="sec-cross-proxies-proxy-req">
        <name>Request Processing at the Proxy</name>
        <t>The proxy translates the HTTP request to a CoAP request, as per <xref target="RFC8075"/>. The additional rules for HTTP messages with the HTTP Multicast-Timeout header field and HTTP Group-ETag header field are defined in <xref target="sec-multicast-timeout-header"/> and <xref target="sec-group-etag-header"/>, respectively.</t>
        <t>Once translated the HTTP request into a CoAP request, the proxy <bcp14>MUST</bcp14> perform the steps defined in <xref target="ssec-req-proc-proxy"/>. If the proxy supports caching of responses, it can serve the unicast request also by using cached responses as per <xref target="sec-proxy-caching"/>, considering the CoAP request above as the potentially matching request.</t>
        <t>In addition, in case the HTTP Multicast-Timeout header field had value 0, the proxy replies to the client with an HTTP response with status code 204 (No Content), right after forwarding the group request to the group of servers.</t>
      </section>
      <section anchor="sec-cross-proxies-proxy-resp">
        <name>Response Processing at the Proxy</name>
        <t>Upon receiving a CoAP response matching with the group request before the amount of time T' &gt; 0 has elapsed, the proxy includes the Reply-From Option in the response, as per Step 1 of <xref target="ssec-resp-proc-proxy-steps"/>. Then, the proxy translates the CoAP response to an HTTP response, as per <xref section="10.1" sectionFormat="of" target="RFC7252"/> and <xref target="RFC8075"/>, as well as <xref section="11.2" sectionFormat="of" target="RFC8613"/> if Group OSCORE is used end-to-end between the client and servers. The additional rules for CoAP messages specifying the Reply-From Option are defined in <xref target="sec-reply-from-header"/>.</t>
        <t>After that, the proxy stores the resulting HTTP response until the timeout with original value T' &gt; 0 expires. If, before then, the proxy receives another response to the same group request from the same CoAP server, the proxy performs the steps above and stores the resulting HTTP response by superseding the currently stored one from that server.</t>
        <t>When the timeout expires, if no responses have been received from the servers, the proxy replies to the client's original unicast group request with an HTTP response with status code 204 (No Content).</t>
        <t>Otherwise, the proxy relays to the client all the collected and stored HTTP responses to the group request, according to the following steps.</t>
        <ol spacing="normal" type="1"><li>
            <t>The proxy prepares a single HTTP batch response, which <bcp14>MUST</bcp14> have 200 (OK) status code and <bcp14>MUST</bcp14> have its HTTP Content-Type header field with value multipart/mixed <xref target="RFC2046"/>.</t>
          </li>
          <li>
            <t>For each stored individual HTTP response RESP, the proxy prepares a corresponding batch part to include in the HTTP batch response, such that:  </t>
            <ul spacing="normal">
              <li>
                <t>The batch part has its own HTTP Content-Type header field with value application/http <xref target="RFC9112"/>.</t>
              </li>
              <li>
                <t>The body of the batch part is the individual HTTP response RESP, including its status code, headers, and body.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>The proxy includes each batch part prepared at Step 2 in the HTTP batch response.</t>
          </li>
          <li>
            <t>The proxy replies to the client's original unicast group request, by sending the HTTP batch response. When doing so, the proxy protects the response according to the security association that it has with the client.</t>
          </li>
        </ol>
      </section>
      <section anchor="sec-cross-proxies-client-resp">
        <name>Response Processing at the Client</name>
        <t>When it receives an HTTP response as a reply to the original unicast group request, the client proceeds as follows.</t>
        <ol spacing="normal" type="1"><li>
            <t>The client decrypts and verifies the response, according to the security association that it has with the proxy.</t>
          </li>
          <li>
            <t>From the resulting HTTP batch response, the client extracts the different batch parts.</t>
          </li>
          <li>
            <t>From each of the extracted batch parts, the client extracts the body as one of the individual HTTP response RESP.</t>
          </li>
          <li>
            <t>For each individual HTTP response RESP, the client performs the following steps.  </t>
            <ul spacing="normal">
              <li>
                <t>If Group OSCORE is used end-to-end between the client and servers, the client translates the HTTP response RESP into a CoAP response, as per <xref section="11.3" sectionFormat="of" target="RFC8613"/>. Then, the client decrypts and verifies the resulting CoAP response by using Group OSCORE, as defined in <xref target="I-D.ietf-core-oscore-groupcomm"/>. Finally, the decrypted CoAP response is mapped to HTTP as per <xref section="10.2" sectionFormat="of" target="RFC7252"/> as well as <xref target="RFC8075"/>. The additional rules for HTTP messages with the HTTP Reply-From header field are defined in <xref target="sec-reply-from-header"/>.</t>
              </li>
              <li>
                <t>The client delivers the individual HTTP response to the application.</t>
              </li>
            </ul>
            <t>
Similarly to Step 3 in <xref target="ssec-resp-proc-client-steps"/>, the client identifies the origin server that originated the CoAP response corresponding to the HTTP response RESP, by means of the addressing information specified as value of the HTTP Reply-From header field. This allows the client to distinguish different individual HTTP responses as corresponding to different CoAP responses from the servers in the CoAP group.</t>
          </li>
        </ol>
      </section>
      <section anchor="sec-cross-proxies-example">
        <name>Example</name>
        <t>The examples in this section build on <xref target="sec-workflow-example"/>, with the difference that the origin client C is an HTTP client and the proxy P is an HTTP-to-CoAP cross-proxy. The examples are simply illustrative and are not to be intended as a test vector.</t>
        <t>The following is an example of unicast group request sent by C to P. The URI mapping and notation are based on the "Simple Form" defined in <xref section="5.4.1" sectionFormat="of" target="RFC8075"/>.</t>
        <artwork><![CDATA[
POST https://proxy.url/hc/?target_uri=coap://G_ADDR:G_PORT/ HTTP/1.1
Content-Length: <REQUEST_TOTAL_CONTENT_LENGTH>
Content-Type: text/plain
Multicast-Timeout: 60

Body: Do that!
]]></artwork>
        <t><br/></t>
        <t>The following is an example of HTTP batch response sent by P to C, as a reply to the client's original unicast group request.</t>
        <t>For readability, base64url(cri'X') denotes the base64url encoding of cri'X' without padding (see <xref section="5" sectionFormat="of" target="RFC4648"/>), and cri'X' denotes the byte serialization of a CRI corresponding to the URI X.</t>
        <artwork><![CDATA[
HTTP/1.1 200 OK
Content-Length: <BATCH_RESPONSE_TOTAL_CONTENT_LENGTH>
Content-Type: multipart/mixed; boundary=batch_foo_bar

--batch_foo_bar
Content-Type: application/http

HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: <INDIVIDUAL_RESPONSE_1_CONTENT_LENGTH>
Reply-From: base64url(cri'coap://S1_ADDR:G_PORT')

Body: Done!
--batch_foo_bar
Content-Type: application/http

HTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: <INDIVIDUAL_RESPONSE_2_CONTENT_LENGTH>
Reply-From: base64url(cri'coap://S2_ADDR:S2_PORT')

Body: More than done!
--batch_foo_bar--
]]></artwork>
      </section>
      <section anchor="sec-resp-streaming">
        <name>Streamed Delivery of Responses to the Client</name>
        <t>[ TODO</t>
        <t>The proxy might still be able to forward back individual responses to the client in a streamed fashion.</t>
        <t>Individual responses can be forwarded back one by one as they come (like a CoAP-to-CoAP proxy does), or as soon as a certain amount of them has been received from the servers.</t>
        <t>This can be achieved by combining the Content-Type multipart/mixed used in the previous sections with the Transfer-Coding "chunked" specified in RFC 9112.</t>
        <t>The above applies to HTTP 1.1, while HTTP/2 has its own mechanisms for data streaming.</t>
        <t>]</t>
      </section>
      <section anchor="sec-reverse-proxies-http-to-coap">
        <name>Reverse-Proxies</name>
        <t>In case an HTTP-to-CoAP proxy acts specifically as a reverse-proxy, the same principles defined in <xref target="sec-reverse-proxies"/> apply, as specified in the following subsections.</t>
        <section anchor="sec-reverse-proxies-client-side-http">
          <name>Processing on the Client Side</name>
          <t>If an HTTP client sends a request intended for a group of servers and is aware of actually communicating with a reverse-proxy, then the client <bcp14>MUST</bcp14> perform the steps defined in <xref target="sec-cross-proxies-client-req"/>. In particular, this results in a request sent to the proxy including a Multicast-Timeout header field.</t>
          <t>The client processes the HTTP response forwarded back by the proxy as defined in <xref target="sec-cross-proxies-client-resp"/>. If the client wishes to send a follow-up unicast request intended only to one of the CoAP servers that generated the response, the same concepts defined in <xref target="sec-reverse-proxies-client-side"/> apply to the composition of HTTP requests.</t>
        </section>
        <section anchor="sec-reverse-proxies-proxy-side-http">
          <name>Processing on the Proxy Side</name>
          <t>If the proxy receives a request and determines that the request should be forwarded to a group of servers over IP multicast, then the same as defined in <xref target="sec-cross-proxies-proxy-req"/> applies, with the following difference.</t>
          <ul spacing="normal">
            <li>
              <t>Once translated the HTTP request into a CoAP request, the proxy performs what is defined in <xref target="sec-reverse-proxies-proxy-side"/>.</t>
            </li>
          </ul>
          <t>The proxy processes the HTTP response sent to the client as defined in <xref target="sec-cross-proxies-proxy-resp"/>.</t>
        </section>
      </section>
    </section>
    <section anchor="sec-security-considerations">
      <name>Security Considerations</name>
      <t>The security considerations from <xref target="RFC7252"/>, <xref target="I-D.ietf-core-groupcomm-bis"/>, <xref target="RFC8613"/>, and <xref target="I-D.ietf-core-oscore-groupcomm"/> hold for this document.</t>
      <t>When a chain of proxies is used (see <xref target="sec-proxy-chain"/>), the secure communication between any two adjacent hops is independent of that between any other two adjacent hops.</t>
      <t>When Group OSCORE is used for end-to-end secure group communication between the origin client and the origin servers, this security association is unaffected by the possible presence of a proxy or a chain of proxies.</t>
      <t>Furthermore, the following additional considerations hold.</t>
      <section anchor="sec-security-considerations-client-auth">
        <name>Client Authentication</name>
        <t>As per the requirement REQ2 (see <xref target="sec-objectives"/>), the client has to authenticate to the proxy when sending a group request to forward. This leverages an established security association between the client and the proxy, which the client uses to protect the group request before sending it to the proxy.</t>
        <t>If the group request is also protected end-to-end between the client and the origin servers using the group mode of Group OSCORE, the proxy can act as external signature checker (see <xref section="7.5" sectionFormat="of" target="I-D.ietf-core-oscore-groupcomm"/>) and authenticate the client by successfully verifying the signature embedded in the group request. However, this requires the proxy to store, for each client to authenticate, the authentication credential that the client uses in the OSCORE group and the public key included therein, and to also store the authentication credential of the Group Manager responsible for the OSCORE group. This in turn would require a form of active synchronization between the proxy and the Group Manager for that group <xref target="I-D.ietf-core-oscore-groupcomm"/>.</t>
        <t>Nevertheless, the client and the proxy <bcp14>SHOULD</bcp14> still rely on a full-fledged pairwise secure association. In addition to ensuring the integrity of group requests sent to the proxy (see <xref target="sec-security-considerations-opt1"/>, <xref target="sec-security-considerations-opt2"/>, and <xref target="sec-security-considerations-opt3"/>), this prevents the proxy from forwarding replayed group requests with a valid signature, as possibly injected by an active, on-path adversary.</t>
        <t>The same considerations apply when a chain of proxies is used (see <xref target="sec-proxy-chain"/>), with each proxy but the last one in the chain acting as client with the next hop towards the origin servers.</t>
      </section>
      <section anchor="sec-security-considerations-opt1">
        <name>Multicast-Timeout Option</name>
        <t>The Multicast-Timeout Option is of class U for OSCORE <xref target="RFC8613"/>. Hence, also when Group OSCORE is used between the client and the servers <xref target="I-D.ietf-core-oscore-groupcomm"/>, a proxy is able to access the option value and retrieve the timeout value T', as well as to remove the option altogether before forwarding the group request to the servers. When a chain of proxies is used (see <xref target="sec-proxy-chain"/>), this also allows each proxy but the last one in the chain to update the option value, as an indication for the next hop towards the origin servers (see <xref target="sec-proxy-chain-request-processing"/>).</t>
        <t>The security association between the client and the proxy <bcp14>MUST</bcp14> provide message integrity, so that further intermediaries between the two as well as on-path active adversaries are not able to undetectably remove the option or alter its content, before the group request reaches the proxy.</t>
        <t>Removing the option would result in not forwarding the group request to the servers. Altering the option content would result in the proxy accepting and forwarding back responses for an amount of time different from the one actually indicated by the client.</t>
        <t>The security association between the client and the proxy <bcp14>SHOULD</bcp14> also provide message confidentiality. Otherwise, any further intermediaries between the two as well as any on-path passive adversaries would be able to access the option content, thereby learning for how long the client is willing to receive responses from the servers in the group via the proxy. This may in turn be used by an on-path active adversary to perform a more efficient, selective suppression of responses from the servers.</t>
        <t>When the client protects the unicast request sent to the proxy using OSCORE (see <xref target="I-D.ietf-core-oscore-capable-proxies"/>) and/or (D)TLS, both message integrity and message confidentiality are achieved in the leg between the client and the proxy.</t>
        <t>The same considerations above about security associations apply when a chain of proxies is used (see <xref target="sec-proxy-chain"/>), with each proxy but the last one in the chain acting as client with the next hop towards the origin servers.</t>
      </section>
      <section anchor="sec-security-considerations-opt2">
        <name>Reply-From Option</name>
        <t>The Reply-From Option is of class U for OSCORE <xref target="RFC8613"/>. Hence, also when Group OSCORE is used between the client and the servers <xref target="I-D.ietf-core-oscore-groupcomm"/>, the proxy that has forwarded the group request to the servers is able to include the option into a server response, before forwarding this response back to the (previous hop proxy closer to the) origin client.</t>
        <t>The security association between the client and the proxy <bcp14>MUST</bcp14> provide message integrity, so that further intermediaries between the two as well as on-path active adversaries are not able to undetectably remove the option from a forwarded server response or alter its content. This ensures that the client can correctly distinguish the different responses and identify the corresponding origin servers.</t>
        <t>The security association between the client and the proxy <bcp14>SHOULD</bcp14> also provide message confidentiality. Otherwise, any further intermediaries between the two as well as any on-path passive adversaries would be able to access the option content, thereby learning the addressing information of servers in the group. This may in turn be used by an on-path active adversary to perform a more efficient, selective suppression of follow-up requests that the client sends to a specific server, either directly or instead indirectly via the proxy.</t>
        <t>When the proxy protects the response forwarded back to the client using OSCORE (see <xref target="I-D.ietf-core-oscore-capable-proxies"/>) and/or (D)TLS, both message integrity and message confidentiality are achieved in the leg between the client and the proxy.</t>
        <t>The same considerations above about security associations apply when a chain of proxies is used (see <xref target="sec-proxy-chain"/>), with each proxy but the last one in the chain acting as client with the next hop towards the origin servers.</t>
      </section>
      <section anchor="sec-security-considerations-opt3">
        <name>Group-ETag Option</name>
        <t>The Group-ETag Option is of class U for OSCORE <xref target="RFC8613"/>. Hence, also when Group OSCORE is used between the client and the servers <xref target="I-D.ietf-core-oscore-groupcomm"/>, a proxy is able to access the option value and use it to possibly perform response revalidation at its cache entries associated with the servers in the CoAP group, as well as to remove the option altogether before forwarding the group request to the servers. When a chain of proxies is used (see <xref target="sec-proxy-chain"/>), this also allows each proxy but the last one in the chain to update the option value, in order to possibly ask the next hop towards the origin servers to perform response revalidation at its cache entries.</t>
        <t>The security association between the client and the proxy <bcp14>MUST</bcp14> provide message integrity, so that further intermediaries between the two as well as on-path active adversaries are not able to undetectably remove the option or alter its content, before the group request reaches the proxy.</t>
        <t>Removing the option would result in the proxy not performing response revalidation at its cache entries associated with the servers in the CoAP group, even though that was what the client asked for.</t>
        <t>Altering the option content in a group request would result in the proxy performing response revalidation based on different entity-tag values from those actually specified by the client. Consequently, the proxy would erroneously reply with multiple 2.05 (Content) responses conveying the full resource representations from its cache entries instead of with a single 2.03 (Valid) response, or vice versa. Instead, altering the option content in a 2.03 (Valid) or 2.05 (Content) response would result in the client wrongly believing that the already stored or the just received representation, respectively, is also the current one, as per the entity value of the tampered Group-ETag Option.</t>
        <t>The security association between the client and the proxy <bcp14>SHOULD</bcp14> also provide message confidentiality. Otherwise, any further intermediaries between the two as well as any on-path passive adversaries would be able to access the option content, thereby learning the rate and pattern according to which the group resource in question changes over time, as inferable from the entity values read over time.</t>
        <t>When the client protects the unicast request sent to the proxy using OSCORE (see <xref target="I-D.ietf-core-oscore-capable-proxies"/>) and/or (D)TLS, both message integrity and message confidentiality are achieved in the leg between the client and the proxy.</t>
        <t>The same considerations above about security associations apply when a chain of proxies is used (see <xref target="sec-proxy-chain"/>), with each proxy but the last one in the chain acting as client with the next hop towards the origin servers.</t>
        <t>When caching of Group OSCORE secured responses is enabled at the proxy, the same as defined in <xref target="sec-proxy-caching"/> applies, with respect to cache entries and the way they are maintained.</t>
      </section>
      <section anchor="sec-http-to-coap-proxies-sec-con">
        <name>HTTP-to-CoAP Proxies</name>
        <t>Consistently with what is discussed in <xref target="sec-security-considerations-client-auth"/>, an HTTP client has to authenticate to the HTTP-to-CoAP proxy and they <bcp14>SHOULD</bcp14> rely on a full-fledged pairwise secure association. This can rely on a TLS <xref target="RFC8446"/> channel as also recommended in <xref section="12.1" sectionFormat="of" target="RFC8613"/> for when OSCORE is used with HTTP, or on a pairwise OSCORE Security Context shared between the client and the proxy as defined in <xref target="I-D.ietf-core-oscore-capable-proxies"/>.</t>
        <t>[ TODO</t>
        <t>Revisit security considerations from <xref target="RFC8075"/></t>
        <t>]</t>
      </section>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>This document has the following actions for IANA.</t>
      <t>Note to RFC Editor: Please replace all occurrences of "[RFC-XXXX]" with the RFC number of this specification and delete this paragraph.</t>
      <section anchor="iana-coap-options">
        <name>CoAP Option Numbers Registry</name>
        <t>IANA is asked to enter the following option numbers to the "CoAP Option Numbers" registry within the "Constrained RESTful Environments (CoRE) Parameters" registry group.</t>
        <table align="center" anchor="tab-iana-coap-option-numbers">
          <name>Registrations in the CoAP Option Numbers Registry</name>
          <thead>
            <tr>
              <th align="left">Number</th>
              <th align="left">Name</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TBD1</td>
              <td align="left">Multicast-Timeout</td>
              <td align="left">[RFC-XXXX]</td>
            </tr>
            <tr>
              <td align="left">TBD2</td>
              <td align="left">Reply-From</td>
              <td align="left">[RFC-XXXX]</td>
            </tr>
            <tr>
              <td align="left">TBD3</td>
              <td align="left">Group-ETag</td>
              <td align="left">[RFC-XXXX]</td>
            </tr>
          </tbody>
        </table>
        <t>Note to RFC Editor: Please replace "TBD1", "TBD2", and "TBD3" in <xref target="tab-iana-coap-option-numbers"/> with the assigned option numbers. Then please delete this paragraph and the following text within the present <xref target="iana-coap-options"/>.</t>
        <t>For all the three requested options, it is preferred to assign an option number from the value range 0-255.</t>
        <t>For the Multicast-Timeout option, the number suggested to IANA is 2.</t>
        <t>For the Reply-From option, the number suggested to IANA is 248.</t>
        <t>For the Group-ETag option, the number suggested to IANA is 24.</t>
      </section>
      <section anchor="iana-message-headers">
        <name>Hypertext Transfer Protocol (HTTP) Field Name Registry</name>
        <t>IANA is asked to enter the following HTTP header fields to the "Hypertext Transfer Protocol (HTTP) Field Name" registry.</t>
        <table align="center" anchor="tab-iana-http-field-names">
          <name>Registrations in the Hypertext Transfer Protocol (HTTP) Field Name Registry</name>
          <thead>
            <tr>
              <th align="left">Field Name</th>
              <th align="left">Status</th>
              <th align="left">Structured Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Multicast-Timeout</td>
              <td align="left">permanent</td>
              <td align="left"> </td>
              <td align="left">[RFC-XXXX]</td>
            </tr>
            <tr>
              <td align="left">Reply-From</td>
              <td align="left">permanent</td>
              <td align="left">List</td>
              <td align="left">[RFC-XXXX]</td>
            </tr>
            <tr>
              <td align="left">Group-ETag</td>
              <td align="left">permanent</td>
              <td align="left">List</td>
              <td align="left">[RFC-XXXX]</td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-core-groupcomm-bis">
          <front>
            <title>Group Communication for the Constrained Application Protocol (CoAP)</title>
            <author fullname="Esko Dijk" initials="E." surname="Dijk">
              <organization>IoTconsultancy.nl</organization>
            </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="2" month="July" year="2025"/>
            <abstract>
              <t>   The Constrained Application Protocol (CoAP) is a web transfer
   protocol for constrained devices and constrained networks.  In a
   number of use cases, constrained devices often naturally operate in
   groups (e.g., in a building automation scenario, all lights in a
   given room may need to be switched on/off as a group).  This document
   specifies the use of CoAP for group communication, including the use
   of UDP/IP multicast as the default underlying data transport.  Both
   unsecured and secured CoAP group communication are specified.
   Security is achieved by use of the Group Object Security for
   Constrained RESTful Environments (Group OSCORE) protocol.  The target
   application area of this specification is any group communication use
   cases that involve resource-constrained devices or networks that
   support CoAP.  This document replaces and obsoletes RFC 7390, while
   it updates RFC 7252 and RFC 7641.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-groupcomm-bis-14"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-groupcomm">
          <front>
            <title>Group Object Security for Constrained RESTful Environments (Group OSCORE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="5" month="July" year="2025"/>
            <abstract>
              <t>   This document defines the security protocol Group Object Security for
   Constrained RESTful Environments (Group OSCORE), providing end-to-end
   security of CoAP messages exchanged between members of a group, e.g.,
   sent over IP multicast.  In particular, the described protocol
   defines how OSCORE is used in a group communication setting to
   provide source authentication for CoAP group requests, sent by a
   client to multiple servers, and for protection of the corresponding
   CoAP responses.  Group OSCORE also defines a pairwise mode where each
   member of the group can efficiently derive a symmetric pairwise key
   with each other member of the group for pairwise OSCORE
   communication.  Group OSCORE can be used between endpoints
   communicating with CoAP or CoAP-mappable HTTP.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-groupcomm-26"/>
        </reference>
        <reference anchor="I-D.ietf-core-href">
          <front>
            <title>Constrained Resource Identifiers</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="30" month="August" year="2025"/>
            <abstract>
              <t>   The Constrained Resource Identifier (CRI) is a complement to the
   Uniform Resource Identifier (URI) that represents the URI components
   in Concise Binary Object Representation (CBOR) rather than as a
   sequence of characters.  This approach simplifies parsing,
   comparison, and reference resolution in environments with severe
   limitations on processing power, code size, and memory size.

   This RFC updates RFC 7595 to add a note on how the "URI Schemes"
   registry of RFC 7595 cooperates with the "CRI Scheme Numbers"
   registry created by the present RFC.


   // (This "cref" paragraph will be removed by the RFC editor:) The
   // present revision –24 attempts to address follow-on AD review
   // comments as well as comments from the ARTART review.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-href-24"/>
        </reference>
        <reference anchor="RFC2046">
          <front>
            <title>Multipurpose Internet Mail Extensions (MIME) Part Two: Media Types</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="N. Borenstein" initials="N." surname="Borenstein"/>
            <date month="November" year="1996"/>
            <abstract>
              <t>This second document defines the general structure of the MIME media typing system and defines an initial set of media types. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2046"/>
          <seriesInfo name="DOI" value="10.17487/RFC2046"/>
        </reference>
        <reference anchor="RFC4648">
          <front>
            <title>The Base16, Base32, and Base64 Data Encodings</title>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="October" year="2006"/>
            <abstract>
              <t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes. It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4648"/>
          <seriesInfo name="DOI" value="10.17487/RFC4648"/>
        </reference>
        <reference anchor="RFC5234">
          <front>
            <title>Augmented BNF for Syntax Specifications: ABNF</title>
            <author fullname="D. Crocker" initials="D." role="editor" surname="Crocker"/>
            <author fullname="P. Overell" initials="P." surname="Overell"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>Internet technical specifications often need to define a formal syntax. Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications. The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power. The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges. This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="68"/>
          <seriesInfo name="RFC" value="5234"/>
          <seriesInfo name="DOI" value="10.17487/RFC5234"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC7641">
          <front>
            <title>Observing Resources in the Constrained Application Protocol (CoAP)</title>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <date month="September" year="2015"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a RESTful application protocol for constrained nodes and networks. The state of a resource on a CoAP server can change over time. This document specifies a simple protocol extension for CoAP that enables CoAP clients to "observe" resources, i.e., to retrieve a representation of a resource and keep this representation updated by the server over a period of time. The protocol follows a best-effort approach for sending new representations to clients and provides eventual consistency between the state observed by each client and the actual resource state at the server.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7641"/>
          <seriesInfo name="DOI" value="10.17487/RFC7641"/>
        </reference>
        <reference anchor="RFC7967">
          <front>
            <title>Constrained Application Protocol (CoAP) Option for No Server Response</title>
            <author fullname="A. Bhattacharyya" initials="A." surname="Bhattacharyya"/>
            <author fullname="S. Bandyopadhyay" initials="S." surname="Bandyopadhyay"/>
            <author fullname="A. Pal" initials="A." surname="Pal"/>
            <author fullname="T. Bose" initials="T." surname="Bose"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>There can be machine-to-machine (M2M) scenarios where server responses to client requests are redundant. This kind of open-loop exchange (with no response path from the server to the client) may be desired to minimize resource consumption in constrained systems while updating many resources simultaneously or performing high-frequency updates. CoAP already provides Non-confirmable (NON) messages that are not acknowledged by the recipient. However, the request/response semantics still require the server to respond with a status code indicating "the result of the attempt to understand and satisfy the request", per RFC 7252.</t>
              <t>This specification introduces a CoAP option called 'No-Response'. Using this option, the client can explicitly express to the server its disinterest in all responses against the particular request. This option also provides granular control to enable expression of disinterest to a particular response class or a combination of response classes. The server MAY decide to suppress the response by not transmitting it back to the client according to the value of the No-Response option in the request. This option may be effective for both unicast and multicast requests. This document also discusses a few examples of applications that benefit from this option.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7967"/>
          <seriesInfo name="DOI" value="10.17487/RFC7967"/>
        </reference>
        <reference anchor="RFC8075">
          <front>
            <title>Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP)</title>
            <author fullname="A. Castellani" initials="A." surname="Castellani"/>
            <author fullname="S. Loreto" initials="S." surname="Loreto"/>
            <author fullname="A. Rahman" initials="A." surname="Rahman"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <author fullname="E. Dijk" initials="E." surname="Dijk"/>
            <date month="February" year="2017"/>
            <abstract>
              <t>This document provides reference information for implementing a cross-protocol network proxy that performs translation from the HTTP protocol to the Constrained Application Protocol (CoAP). This will enable an HTTP client to access resources on a CoAP server through the proxy. This document describes how an HTTP request is mapped to a CoAP request and how a CoAP response is mapped back to an HTTP response. This includes guidelines for status code, URI, and media type mappings, as well as additional interworking advice.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8075"/>
          <seriesInfo name="DOI" value="10.17487/RFC8075"/>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC8613">
          <front>
            <title>Object Security for Constrained RESTful Environments (OSCORE)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Mattsson" initials="J." surname="Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <author fullname="L. Seitz" initials="L." surname="Seitz"/>
            <date month="July" year="2019"/>
            <abstract>
              <t>This document defines Object Security for Constrained RESTful Environments (OSCORE), a method for application-layer protection of the Constrained Application Protocol (CoAP), using CBOR Object Signing and Encryption (COSE). OSCORE provides end-to-end protection between endpoints communicating using CoAP or CoAP-mappable HTTP. OSCORE is designed for constrained nodes and networks supporting a range of proxy operations, including translation between different transport protocols.</t>
              <t>Although an optional functionality of CoAP, OSCORE alters CoAP options processing and IANA registration. Therefore, this document updates RFC 7252.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8613"/>
          <seriesInfo name="DOI" value="10.17487/RFC8613"/>
        </reference>
        <reference anchor="RFC8742">
          <front>
            <title>Concise Binary Object Representation (CBOR) Sequences</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="February" year="2020"/>
            <abstract>
              <t>This document describes the Concise Binary Object Representation (CBOR) Sequence format and associated media type "application/cbor-seq". A CBOR Sequence consists of any number of encoded CBOR data items, simply concatenated in sequence.</t>
              <t>Structured syntax suffixes for media types allow other media types to build on them and make it explicit that they are built on an existing media type as their foundation. This specification defines and registers "+cbor-seq" as a structured syntax suffix for CBOR Sequences.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8742"/>
          <seriesInfo name="DOI" value="10.17487/RFC8742"/>
        </reference>
        <reference anchor="RFC8949">
          <front>
            <title>Concise Binary Object Representation (CBOR)</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
            <date month="December" year="2020"/>
            <abstract>
              <t>The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.</t>
              <t>This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="94"/>
          <seriesInfo name="RFC" value="8949"/>
          <seriesInfo name="DOI" value="10.17487/RFC8949"/>
        </reference>
        <reference anchor="RFC9112">
          <front>
            <title>HTTP/1.1</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.</t>
              <t>This document obsoletes portions of RFC 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="99"/>
          <seriesInfo name="RFC" value="9112"/>
          <seriesInfo name="DOI" value="10.17487/RFC9112"/>
        </reference>
        <reference anchor="RFC9651">
          <front>
            <title>Structured Field Values for HTTP</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="P-H. Kamp" surname="P-H. Kamp"/>
            <date month="September" year="2024"/>
            <abstract>
              <t>This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handle HTTP header and trailer fields, known as "Structured Fields", "Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields.</t>
              <t>This document obsoletes RFC 8941.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9651"/>
          <seriesInfo name="DOI" value="10.17487/RFC9651"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.bormann-coap-misc">
          <front>
            <title>Miscellaneous additions to CoAP</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <author fullname="Klaus Hartke" initials="K." surname="Hartke">
              <organization>Universitaet Bremen TZI</organization>
            </author>
            <date day="14" month="November" year="2014"/>
            <abstract>
              <t>   This short I-D makes a number of partially interrelated proposals how
   to solve certain problems in the CoRE WG's main protocol, the
   Constrained Application Protocol (CoAP).  The current version has
   been resubmitted to keep information about these proposals available;
   the proposals are not all fleshed out at this point in time.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-bormann-coap-misc-27"/>
        </reference>
        <reference anchor="I-D.tiloca-core-oscore-discovery">
          <front>
            <title>Discovery of OSCORE Groups with the CoRE Resource Directory</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Peter Van der Stok" initials="P." surname="Van der Stok">
         </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Group communication over the Constrained Application Protocol (CoAP)
   can be secured by means of Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  At deployment time, devices may
   not know the exact security groups to join, the respective Group
   Manager, or other information required to perform the joining
   process.  This document describes how a CoAP endpoint can use
   descriptions and links of resources registered at the CoRE Resource
   Directory to discover security groups and to acquire information for
   joining them through the respective Group Manager.  A given security
   group may protect multiple application groups, which are separately
   announced in the Resource Directory as sets of endpoints sharing a
   pool of resources.  This approach is consistent with, but not limited
   to, the joining of security groups based on the ACE framework for
   Authentication and Authorization in constrained environments.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-tiloca-core-oscore-discovery-17"/>
        </reference>
        <reference anchor="I-D.amsuess-core-cachable-oscore">
          <front>
            <title>Cacheable OSCORE</title>
            <author fullname="Christian Amsüss" initials="C." surname="Amsüss">
         </author>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <date day="6" month="July" year="2025"/>
            <abstract>
              <t>   Group communication with the Constrained Application Protocol (CoAP)
   can be secured end-to-end using Group Object Security for Constrained
   RESTful Environments (Group OSCORE), also across untrusted
   intermediary proxies.  However, this sidesteps the proxies' abilities
   to cache responses from the origin server(s).  This specification
   restores cacheability of protected responses at proxies, by
   introducing consensus requests which any client in a group can send
   to one server or multiple servers in the same group.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-amsuess-core-cachable-oscore-11"/>
        </reference>
        <reference anchor="I-D.ietf-ace-key-groupcomm-oscore">
          <front>
            <title>Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE)</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <date day="28" month="August" year="2025"/>
            <abstract>
              <t>   This document defines an application profile of the Authentication
   and Authorization for Constrained Environments (ACE) framework, to
   request and provision keying material in group communication
   scenarios that are based on the Constrained Application Protocol
   (CoAP) and are secured with Group Object Security for Constrained
   RESTful Environments (Group OSCORE).  This application profile
   delegates the authentication and authorization of Clients, which join
   an OSCORE group through a Resource Server acting as Group Manager for
   that group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication, and proof of possession for a key owned by the Client
   and bound to an OAuth 2.0 access token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-key-groupcomm-oscore-18"/>
        </reference>
        <reference anchor="I-D.ietf-core-oscore-capable-proxies">
          <front>
            <title>OSCORE-capable Proxies</title>
            <author fullname="Marco Tiloca" initials="M." surname="Tiloca">
              <organization>RISE AB</organization>
            </author>
            <author fullname="Rikard Höglund" initials="R." surname="Höglund">
              <organization>RISE AB</organization>
            </author>
            <date day="3" month="March" year="2025"/>
            <abstract>
              <t>   Object Security for Constrained RESTful Environments (OSCORE) can be
   used to protect CoAP messages end-to-end between two endpoints at the
   application layer, also in the presence of intermediaries such as
   proxies.  This document defines how to use OSCORE for protecting CoAP
   messages also between an origin application endpoint and an
   intermediary, or between two intermediaries.  Also, it defines rules
   to escalate the protection of a CoAP option, in order to encrypt and
   integrity-protect it whenever possible.  Finally, it defines how to
   secure a CoAP message by applying multiple, nested OSCORE
   protections, e.g., both end-to-end between origin application
   endpoints, and between an application endpoint and an intermediary or
   between two intermediaries.  Therefore, this document updates RFC
   8613.  Furthermore, this document updates RFC 8768, by explicitly
   defining the processing with OSCORE for the CoAP option Hop-Limit.
   The approach defined in this document can be seamlessly used with
   Group OSCORE, for protecting CoAP messages when group communication
   is used in the presence of intermediaries.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-core-oscore-capable-proxies-04"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
      </references>
    </references>
    <?line 1176?>

<section anchor="sec-reverse-proxies-examples">
      <name>Examples with Reverse-Proxy</name>
      <t>The examples in this section refer to the following actors.</t>
      <ul spacing="normal">
        <li>
          <t>One origin client C, with address C_ADDR and port number C_PORT.</t>
        </li>
        <li>
          <t>One proxy P, with address P_ADDR and server port number P_PORT.</t>
        </li>
        <li>
          <t>Two origin servers S1 and S2, where the server Sx has address Sx_ADDR and port number Sx_PORT.</t>
        </li>
      </ul>
      <t>The origin servers are members of a CoAP group with IP multicast address G_ADDR and port number G_PORT. Also, the origin servers are members of the same application group and share the same resource /r.</t>
      <t>The communication between C and P is based on CoAP over TCP, as per <xref target="RFC8323"/>. The group communication between P and the origin servers is based on CoAP over UDP and IP multicast, as per <xref target="I-D.ietf-core-groupcomm-bis"/>.</t>
      <t>Finally, cri'X' denotes a CRI or CRI reference corresponding to the URI or URI reference X.</t>
      <section anchor="sec-reverse-proxies-examples-ex1">
        <name>Example 1</name>
        <t>The example shown in <xref target="workflow-example-reverse-1"/> considers a reverse-proxy P that provides access to both the whole group of servers {S1,S2} and also to each of those servers individually. The client C may not have a way to reach the servers directly (e.g., P is acting as a firewall).</t>
        <t>After the client C has received two responses to its group request sent via the proxy, it selects one server (S1) and sends a new request again via the proxy, intended only for that server and targeting a different resource /r1 in unicast.</t>
        <t>In particular:</t>
        <ul spacing="normal">
          <li>
            <t>In its group request to P, the client C includes the Uri-Host Option with value "group1.com" and the Uri-Path Option with value "r".</t>
          </li>
          <li>
            <t>The hostname 'group1.com' resolves to the IPv6 multicast address G_ADDR. The proxy P performs this resolution upon receiving the group request from C.  </t>
            <t>
Since such a request does not include the Uri-Port Option, P infers G_PORT to be the default port number 5683 for CoAP over UDP with the "coap" URI scheme.  </t>
            <t>
Based on this information, P composes the group request and sends it to the CoAP group at G_ADDR:G_PORT.</t>
          </li>
          <li>
            <t>Typically, S1_PORT and S2_PORT will be equal to G_PORT, but a server Sx is allowed to reply to the multicast request from another port number not equal to G_PORT. For this reason, the notation Sx_PORT is used.</t>
          </li>
        </ul>
        <t>Note that this type of reverse-proxy only requires one unicast IP address (P_ADDR) for the proxy, so it scales well with a large number of servers Sx. Instead, the type of reverse-proxy in the example in <xref target="sec-reverse-proxies-examples-ex2"/> requires one IP address for each server Sx and one for each CoAP group that the proxy supports.</t>
        <figure anchor="workflow-example-reverse-1">
          <name>Workflow Example with a Reverse-Proxy Standing in for Both the Whole Group of Servers and Each Individual Server. This Configuration Requires the Proxy to Have Only One Pair (IP Address, Port Number)</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1504" width="576" viewBox="0 0 576 1504" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,1488" fill="none" stroke="black"/>
                <path d="M 304,48 L 304,1056" fill="none" stroke="black"/>
                <path d="M 304,1104 L 304,1488" fill="none" stroke="black"/>
                <path d="M 488,48 L 488,520" fill="none" stroke="black"/>
                <path d="M 488,536 L 488,856" fill="none" stroke="black"/>
                <path d="M 488,912 L 488,1488" fill="none" stroke="black"/>
                <path d="M 568,48 L 568,1488" fill="none" stroke="black"/>
                <path d="M 8,64 L 296,64" fill="none" stroke="black"/>
                <path d="M 16,176 L 304,176" fill="none" stroke="black"/>
                <path d="M 8,320 L 296,320" fill="none" stroke="black"/>
                <path d="M 304,496 L 480,496" fill="none" stroke="black"/>
                <path d="M 448,528 L 560,528" fill="none" stroke="black"/>
                <path d="M 312,656 L 488,656" fill="none" stroke="black"/>
                <path d="M 16,736 L 304,736" fill="none" stroke="black"/>
                <path d="M 312,864 L 568,864" fill="none" stroke="black"/>
                <path d="M 16,944 L 304,944" fill="none" stroke="black"/>
                <path d="M 8,1136 L 296,1136" fill="none" stroke="black"/>
                <path d="M 304,1312 L 480,1312" fill="none" stroke="black"/>
                <path d="M 312,1360 L 488,1360" fill="none" stroke="black"/>
                <path d="M 16,1440 L 304,1440" fill="none" stroke="black"/>
                <path d="M 432,496 L 448,528" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="568,528 556,522.4 556,533.6" fill="black" transform="rotate(0,560,528)"/>
                <polygon class="arrowhead" points="488,1312 476,1306.4 476,1317.6" fill="black" transform="rotate(0,480,1312)"/>
                <polygon class="arrowhead" points="488,496 476,490.4 476,501.6" fill="black" transform="rotate(0,480,496)"/>
                <polygon class="arrowhead" points="320,1360 308,1354.4 308,1365.6" fill="black" transform="rotate(180,312,1360)"/>
                <polygon class="arrowhead" points="320,864 308,858.4 308,869.6" fill="black" transform="rotate(180,312,864)"/>
                <polygon class="arrowhead" points="320,656 308,650.4 308,661.6" fill="black" transform="rotate(180,312,656)"/>
                <polygon class="arrowhead" points="304,1136 292,1130.4 292,1141.6" fill="black" transform="rotate(0,296,1136)"/>
                <polygon class="arrowhead" points="304,320 292,314.4 292,325.6" fill="black" transform="rotate(0,296,320)"/>
                <polygon class="arrowhead" points="304,64 292,58.4 292,69.6" fill="black" transform="rotate(0,296,64)"/>
                <polygon class="arrowhead" points="24,1440 12,1434.4 12,1445.6" fill="black" transform="rotate(180,16,1440)"/>
                <polygon class="arrowhead" points="24,944 12,938.4 12,949.6" fill="black" transform="rotate(180,16,944)"/>
                <polygon class="arrowhead" points="24,736 12,730.4 12,741.6" fill="black" transform="rotate(180,16,736)"/>
                <polygon class="arrowhead" points="24,176 12,170.4 12,181.6" fill="black" transform="rotate(180,16,176)"/>
                <g class="text">
                  <text x="8" y="36">C</text>
                  <text x="304" y="36">P</text>
                  <text x="492" y="36">S1</text>
                  <text x="564" y="36">S2</text>
                  <text x="320" y="68">/</text>
                  <text x="336" y="68">C</text>
                  <text x="356" y="68">is</text>
                  <text x="384" y="68">not</text>
                  <text x="424" y="68">aware</text>
                  <text x="36" y="84">Src:</text>
                  <text x="112" y="84">C_ADDR:C_PORT</text>
                  <text x="332" y="84">that</text>
                  <text x="360" y="84">P</text>
                  <text x="380" y="84">is</text>
                  <text x="404" y="84">in</text>
                  <text x="436" y="84">fact</text>
                  <text x="36" y="100">Dst:</text>
                  <text x="112" y="100">P_ADDR:P_PORT</text>
                  <text x="320" y="100">a</text>
                  <text x="384" y="100">reverse-proxy</text>
                  <text x="448" y="100">/</text>
                  <text x="56" y="116">Uri-Host:</text>
                  <text x="148" y="116">"group1.com"</text>
                  <text x="56" y="132">Uri-Path:</text>
                  <text x="112" y="132">"r"</text>
                  <text x="36" y="196">Src:</text>
                  <text x="112" y="196">P_ADDR:P_PORT</text>
                  <text x="36" y="212">Dst:</text>
                  <text x="112" y="212">C_ADDR:C_PORT</text>
                  <text x="36" y="228">4.00</text>
                  <text x="72" y="228">Bad</text>
                  <text x="120" y="228">Request</text>
                  <text x="92" y="244">Multicast-Timeout:</text>
                  <text x="176" y="244">-</text>
                  <text x="216" y="244">(empty)</text>
                  <text x="52" y="260">Payload:</text>
                  <text x="120" y="260">"Please</text>
                  <text x="168" y="260">use</text>
                  <text x="108" y="276">Multicast-Timeout"</text>
                  <text x="36" y="340">Src:</text>
                  <text x="112" y="340">C_ADDR:C_PORT</text>
                  <text x="36" y="356">Dst:</text>
                  <text x="112" y="356">P_ADDR:P_PORT</text>
                  <text x="56" y="372">Uri-Host:</text>
                  <text x="148" y="372">"group1.com"</text>
                  <text x="56" y="388">Uri-Path:</text>
                  <text x="112" y="388">"r"</text>
                  <text x="92" y="404">Multicast-Timeout:</text>
                  <text x="180" y="404">60</text>
                  <text x="332" y="452">Src:</text>
                  <text x="408" y="452">P_ADDR:P_PORT</text>
                  <text x="332" y="468">Dst:</text>
                  <text x="408" y="468">G_ADDR:G_PORT</text>
                  <text x="352" y="484">Uri-Path:</text>
                  <text x="408" y="484">"r"</text>
                  <text x="320" y="580">/</text>
                  <text x="336" y="580">t</text>
                  <text x="352" y="580">=</text>
                  <text x="368" y="580">0</text>
                  <text x="384" y="580">:</text>
                  <text x="400" y="580">P</text>
                  <text x="436" y="580">starts</text>
                  <text x="352" y="596">accepting</text>
                  <text x="432" y="596">responses</text>
                  <text x="328" y="612">for</text>
                  <text x="364" y="612">this</text>
                  <text x="416" y="612">request</text>
                  <text x="456" y="612">/</text>
                  <text x="332" y="676">Src:</text>
                  <text x="416" y="676">S1_ADDR:S1_PORT</text>
                  <text x="332" y="692">Dst:</text>
                  <text x="408" y="692">P_ADDR:P_PORT</text>
                  <text x="36" y="756">Src:</text>
                  <text x="112" y="756">P_ADDR:P_PORT</text>
                  <text x="36" y="772">Dst:</text>
                  <text x="112" y="772">C_ADDR:C_PORT</text>
                  <text x="64" y="788">Reply-From:</text>
                  <text x="156" y="804">cri'coap+tcp://P_ADDR:P_PORT',</text>
                  <text x="124" y="820">cri'//S1_ADDR:S1_PORT'</text>
                  <text x="412" y="884">Src:</text>
                  <text x="496" y="884">S2_ADDR:S2_PORT</text>
                  <text x="412" y="900">Dst:</text>
                  <text x="488" y="900">P_ADDR:P_PORT</text>
                  <text x="36" y="964">Src:</text>
                  <text x="112" y="964">P_ADDR:P_PORT</text>
                  <text x="36" y="980">Dst:</text>
                  <text x="112" y="980">C_ADDR:C_PORT</text>
                  <text x="64" y="996">Reply-From:</text>
                  <text x="156" y="1012">cri'coap+tcp://P_ADDR:P_PORT',</text>
                  <text x="124" y="1028">cri'//S2_ADDR:S2_PORT'</text>
                  <text x="176" y="1076">/</text>
                  <text x="196" y="1076">At</text>
                  <text x="216" y="1076">t</text>
                  <text x="232" y="1076">=</text>
                  <text x="256" y="1076">60,</text>
                  <text x="280" y="1076">P</text>
                  <text x="312" y="1076">stops</text>
                  <text x="376" y="1076">accepting</text>
                  <text x="208" y="1092">responses</text>
                  <text x="264" y="1092">for</text>
                  <text x="300" y="1092">this</text>
                  <text x="352" y="1092">request</text>
                  <text x="392" y="1092">/</text>
                  <text x="320" y="1140">/</text>
                  <text x="360" y="1140">Request</text>
                  <text x="428" y="1140">intended</text>
                  <text x="36" y="1156">Src:</text>
                  <text x="112" y="1156">C_ADDR:C_PORT</text>
                  <text x="332" y="1156">only</text>
                  <text x="368" y="1156">for</text>
                  <text x="400" y="1156">S1,</text>
                  <text x="432" y="1156">via</text>
                  <text x="464" y="1156">the</text>
                  <text x="36" y="1172">Dst:</text>
                  <text x="112" y="1172">P_ADDR:P_PORT</text>
                  <text x="336" y="1172">proxy</text>
                  <text x="368" y="1172">P</text>
                  <text x="384" y="1172">/</text>
                  <text x="56" y="1188">Uri-Host:</text>
                  <text x="136" y="1188">"S1_ADDR"</text>
                  <text x="56" y="1204">Uri-Port:</text>
                  <text x="128" y="1204">S1_PORT</text>
                  <text x="56" y="1220">Uri-Path:</text>
                  <text x="116" y="1220">"r1"</text>
                  <text x="332" y="1268">Src:</text>
                  <text x="408" y="1268">P_ADDR:P_PORT</text>
                  <text x="332" y="1284">Dst:</text>
                  <text x="416" y="1284">S1_ADDR:S1_PORT</text>
                  <text x="352" y="1300">Uri-Path:</text>
                  <text x="412" y="1300">"r1"</text>
                  <text x="332" y="1380">Src:</text>
                  <text x="416" y="1380">S1_ADDR:S1_PORT</text>
                  <text x="332" y="1396">Dst:</text>
                  <text x="408" y="1396">P_ADDR:P_PORT</text>
                  <text x="164" y="1460">Src:</text>
                  <text x="240" y="1460">P_ADDR:P_PORT</text>
                  <text x="164" y="1476">Dst:</text>
                  <text x="240" y="1476">C_ADDR:C_PORT</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
C                                    P                      S1       S2
|                                    |                      |         |
+----------------------------------->| / C is not aware     |         |
| Src: C_ADDR:C_PORT                 | that P is in fact    |         |
| Dst: P_ADDR:P_PORT                 | a reverse-proxy /    |         |
| Uri-Host: "group1.com"             |                      |         |
| Uri-Path: "r"                      |                      |         |
|                                    |                      |         |
|                                    |                      |         |
|<-----------------------------------+                      |         |
| Src: P_ADDR:P_PORT                 |                      |         |
| Dst: C_ADDR:C_PORT                 |                      |         |
| 4.00 Bad Request                   |                      |         |
| Multicast-Timeout: - (empty)       |                      |         |
| Payload: "Please use               |                      |         |
|   Multicast-Timeout"               |                      |         |
|                                    |                      |         |
|                                    |                      |         |
+----------------------------------->|                      |         |
| Src: C_ADDR:C_PORT                 |                      |         |
| Dst: P_ADDR:P_PORT                 |                      |         |
| Uri-Host: "group1.com"             |                      |         |
| Uri-Path: "r"                      |                      |         |
| Multicast-Timeout: 60              |                      |         |
|                                    |                      |         |
|                                    |                      |         |
|                                    | Src: P_ADDR:P_PORT   |         |
|                                    | Dst: G_ADDR:G_PORT   |         |
|                                    | Uri-Path: "r"        |         |
|                                    +---------------+----->|         |
|                                    |                \     |         |
|                                    |                 `------------->|
|                                    |                      |         |
|                                    |                      |         |
|                                    | / t = 0 : P starts   |         |
|                                    | accepting responses  |         |
|                                    | for this request /   |         |
|                                    |                      |         |
|                                    |                      |         |
|                                    |<---------------------+         |
|                                    | Src: S1_ADDR:S1_PORT |         |
|                                    | Dst: P_ADDR:P_PORT   |         |
|                                    |                      |         |
|                                    |                      |         |
|<-----------------------------------+                      |         |
| Src: P_ADDR:P_PORT                 |                      |         |
| Dst: C_ADDR:C_PORT                 |                      |         |
| Reply-From:                        |                      |         |
|   cri'coap+tcp://P_ADDR:P_PORT',   |                      |         |
|   cri'//S1_ADDR:S1_PORT'           |                      |         |
|                                    |                      |         |
|                                    |                      |         |
|                                    |<-------------------------------+
|                                    |           Src: S2_ADDR:S2_PORT |
|                                    |           Dst: P_ADDR:P_PORT   |
|                                    |                      |         |
|                                    |                      |         |
|<-----------------------------------+                      |         |
| Src: P_ADDR:P_PORT                 |                      |         |
| Dst: C_ADDR:C_PORT                 |                      |         |
| Reply-From:                        |                      |         |
|   cri'coap+tcp://P_ADDR:P_PORT',   |                      |         |
|   cri'//S2_ADDR:S2_PORT'           |                      |         |
|                                    |                      |         |
|                                    |                      |         |
|                    / At t = 60, P stops accepting         |         |
|                    responses for this request /           |         |
|                                    |                      |         |
|                                    |                      |         |
+----------------------------------->| / Request intended   |         |
| Src: C_ADDR:C_PORT                 | only for S1, via the |         |
| Dst: P_ADDR:P_PORT                 | proxy P /            |         |
| Uri-Host: "S1_ADDR"                |                      |         |
| Uri-Port: S1_PORT                  |                      |         |
| Uri-Path: "r1"                     |                      |         |
|                                    |                      |         |
|                                    |                      |         |
|                                    | Src: P_ADDR:P_PORT   |         |
|                                    | Dst: S1_ADDR:S1_PORT |         |
|                                    | Uri-Path: "r1"       |         |
|                                    +--------------------->|         |
|                                    |                      |         |
|                                    |                      |         |
|                                    |<---------------------+         |
|                                    | Src: S1_ADDR:S1_PORT |         |
|                                    | Dst: P_ADDR:P_PORT   |         |
|                                    |                      |         |
|                                    |                      |         |
|<-----------------------------------+                      |         |
|                 Src: P_ADDR:P_PORT |                      |         |
|                 Dst: C_ADDR:C_PORT |                      |         |
|                                    |                      |         |
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sec-reverse-proxies-examples-ex2">
        <name>Example 2</name>
        <t>The example shown in <xref target="workflow-example-reverse-2"/> considers a reverse-proxy that stands in for both the whole group of servers {S1,S2} and for each of those servers Sx. The client C may not have a way to reach the servers directly (e.g., P is acting as a firewall).</t>
        <t>After the client C has received two responses to its group request sent via the proxy, it selects one server (S1) and sends a new request again via the proxy, intended only for that server and targeting the same resource /r in unicast.</t>
        <t>In particular:</t>
        <ul spacing="normal">
          <li>
            <t>When receiving a request addressed to the unicast address P_ADDR and port number P_PORT, the proxy forwards the request towards the CoAP group at G_ADDR:G_PORT leaving the URI path unchanged.</t>
          </li>
          <li>
            <t>The address Dx_ADDR and port number Dx_PORT are also used by the proxy, which forwards an incoming request to that address towards the server at Sx_ADDR:Sx_PORT. The different addresses Dx_ADDR are effectively "proxy IP addresses" used to provide access to the servers.</t>
          </li>
        </ul>
        <t>Note that this type of reverse-proxy implementation requires the proxy to use a (potentially) large number of distinct IP addresses, hence it is not very scalable. Instead, the type of reverse-proxy shown in the example in <xref target="sec-reverse-proxies-examples-ex1"/> uses only one IPv6 unicast address to provide access to all servers and all CoAP groups that the proxy supports.</t>
        <figure anchor="workflow-example-reverse-2">
          <name>Workflow Example With a Reverse-Proxy Standing in for Both the Whole Group of Servers and Each Individual Server. This Configuration Requires the Proxy to Have One Pair (IP Address, Port Number) for Each Group and One for Each Origin Server</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1392" width="576" viewBox="0 0 576 1392" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,1376" fill="none" stroke="black"/>
                <path d="M 296,48 L 296,992" fill="none" stroke="black"/>
                <path d="M 296,1040 L 296,1376" fill="none" stroke="black"/>
                <path d="M 480,48 L 480,488" fill="none" stroke="black"/>
                <path d="M 480,504 L 480,808" fill="none" stroke="black"/>
                <path d="M 480,864 L 480,1376" fill="none" stroke="black"/>
                <path d="M 568,48 L 568,1376" fill="none" stroke="black"/>
                <path d="M 8,64 L 288,64" fill="none" stroke="black"/>
                <path d="M 16,160 L 296,160" fill="none" stroke="black"/>
                <path d="M 8,304 L 288,304" fill="none" stroke="black"/>
                <path d="M 296,464 L 472,464" fill="none" stroke="black"/>
                <path d="M 440,496 L 560,496" fill="none" stroke="black"/>
                <path d="M 304,624 L 480,624" fill="none" stroke="black"/>
                <path d="M 16,704 L 296,704" fill="none" stroke="black"/>
                <path d="M 304,816 L 568,816" fill="none" stroke="black"/>
                <path d="M 16,896 L 296,896" fill="none" stroke="black"/>
                <path d="M 8,1072 L 288,1072" fill="none" stroke="black"/>
                <path d="M 296,1200 L 472,1200" fill="none" stroke="black"/>
                <path d="M 304,1248 L 480,1248" fill="none" stroke="black"/>
                <path d="M 16,1328 L 296,1328" fill="none" stroke="black"/>
                <path d="M 424,464 L 440,496" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="568,496 556,490.4 556,501.6" fill="black" transform="rotate(0,560,496)"/>
                <polygon class="arrowhead" points="480,1200 468,1194.4 468,1205.6" fill="black" transform="rotate(0,472,1200)"/>
                <polygon class="arrowhead" points="480,464 468,458.4 468,469.6" fill="black" transform="rotate(0,472,464)"/>
                <polygon class="arrowhead" points="312,1248 300,1242.4 300,1253.6" fill="black" transform="rotate(180,304,1248)"/>
                <polygon class="arrowhead" points="312,816 300,810.4 300,821.6" fill="black" transform="rotate(180,304,816)"/>
                <polygon class="arrowhead" points="312,624 300,618.4 300,629.6" fill="black" transform="rotate(180,304,624)"/>
                <polygon class="arrowhead" points="296,1072 284,1066.4 284,1077.6" fill="black" transform="rotate(0,288,1072)"/>
                <polygon class="arrowhead" points="296,304 284,298.4 284,309.6" fill="black" transform="rotate(0,288,304)"/>
                <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
                <polygon class="arrowhead" points="24,1328 12,1322.4 12,1333.6" fill="black" transform="rotate(180,16,1328)"/>
                <polygon class="arrowhead" points="24,896 12,890.4 12,901.6" fill="black" transform="rotate(180,16,896)"/>
                <polygon class="arrowhead" points="24,704 12,698.4 12,709.6" fill="black" transform="rotate(180,16,704)"/>
                <polygon class="arrowhead" points="24,160 12,154.4 12,165.6" fill="black" transform="rotate(180,16,160)"/>
                <g class="text">
                  <text x="8" y="36">C</text>
                  <text x="296" y="36">P</text>
                  <text x="484" y="36">S1</text>
                  <text x="564" y="36">S2</text>
                  <text x="312" y="68">/</text>
                  <text x="328" y="68">C</text>
                  <text x="348" y="68">is</text>
                  <text x="376" y="68">not</text>
                  <text x="416" y="68">aware</text>
                  <text x="36" y="84">Src:</text>
                  <text x="112" y="84">C_ADDR:C_PORT</text>
                  <text x="324" y="84">that</text>
                  <text x="352" y="84">P</text>
                  <text x="372" y="84">is</text>
                  <text x="396" y="84">in</text>
                  <text x="428" y="84">fact</text>
                  <text x="36" y="100">Dst:</text>
                  <text x="112" y="100">P_ADDR:P_PORT</text>
                  <text x="312" y="100">a</text>
                  <text x="376" y="100">reverse-proxy</text>
                  <text x="440" y="100">/</text>
                  <text x="56" y="116">Uri-Path:</text>
                  <text x="112" y="116">"r"</text>
                  <text x="36" y="180">Src:</text>
                  <text x="112" y="180">P_ADDR:P_PORT</text>
                  <text x="36" y="196">Dst:</text>
                  <text x="112" y="196">C_ADDR:C_PORT</text>
                  <text x="36" y="212">4.00</text>
                  <text x="72" y="212">Bad</text>
                  <text x="120" y="212">Request</text>
                  <text x="92" y="228">Multicast-Timeout:</text>
                  <text x="176" y="228">-</text>
                  <text x="216" y="228">(empty)</text>
                  <text x="52" y="244">Payload:</text>
                  <text x="120" y="244">"Please</text>
                  <text x="168" y="244">use</text>
                  <text x="108" y="260">Multicast-Timeout"</text>
                  <text x="36" y="324">Src:</text>
                  <text x="112" y="324">C_ADDR:C_PORT</text>
                  <text x="36" y="340">Dst:</text>
                  <text x="112" y="340">P_ADDR:P_PORT</text>
                  <text x="56" y="356">Uri-Path:</text>
                  <text x="112" y="356">"r"</text>
                  <text x="92" y="372">Multicast-Timeout:</text>
                  <text x="180" y="372">60</text>
                  <text x="324" y="420">Src:</text>
                  <text x="400" y="420">P_ADDR:P_PORT</text>
                  <text x="324" y="436">Dst:</text>
                  <text x="400" y="436">G_ADDR:G_PORT</text>
                  <text x="344" y="452">Uri-Path:</text>
                  <text x="400" y="452">"r"</text>
                  <text x="312" y="548">/</text>
                  <text x="328" y="548">t</text>
                  <text x="344" y="548">=</text>
                  <text x="360" y="548">0</text>
                  <text x="376" y="548">:</text>
                  <text x="392" y="548">P</text>
                  <text x="428" y="548">starts</text>
                  <text x="344" y="564">accepting</text>
                  <text x="424" y="564">responses</text>
                  <text x="320" y="580">for</text>
                  <text x="356" y="580">this</text>
                  <text x="408" y="580">request</text>
                  <text x="448" y="580">/</text>
                  <text x="324" y="644">Src:</text>
                  <text x="408" y="644">S1_ADDR:S1_PORT</text>
                  <text x="324" y="660">Dst:</text>
                  <text x="400" y="660">P_ADDR:P_PORT</text>
                  <text x="36" y="724">Src:</text>
                  <text x="112" y="724">P_ADDR:P_PORT</text>
                  <text x="36" y="740">Dst:</text>
                  <text x="112" y="740">C_ADDR:C_PORT</text>
                  <text x="64" y="756">Reply-From:</text>
                  <text x="160" y="772">cri'coap+tcp://D1_ADDR:D1_PORT'</text>
                  <text x="412" y="836">Src:</text>
                  <text x="496" y="836">S2_ADDR:S2_PORT</text>
                  <text x="412" y="852">Dst:</text>
                  <text x="488" y="852">P_ADDR:P_PORT</text>
                  <text x="36" y="916">Src:</text>
                  <text x="112" y="916">P_ADDR:P_PORT</text>
                  <text x="36" y="932">Dst:</text>
                  <text x="112" y="932">C_ADDR:C_PORT</text>
                  <text x="64" y="948">Reply-From:</text>
                  <text x="160" y="964">cri'coap+tcp://D2_ADDR:D2_PORT'</text>
                  <text x="168" y="1012">/</text>
                  <text x="188" y="1012">At</text>
                  <text x="208" y="1012">t</text>
                  <text x="224" y="1012">=</text>
                  <text x="248" y="1012">60,</text>
                  <text x="272" y="1012">P</text>
                  <text x="304" y="1012">stops</text>
                  <text x="368" y="1012">accepting</text>
                  <text x="200" y="1028">responses</text>
                  <text x="256" y="1028">for</text>
                  <text x="292" y="1028">this</text>
                  <text x="344" y="1028">request</text>
                  <text x="384" y="1028">/</text>
                  <text x="312" y="1076">/</text>
                  <text x="352" y="1076">Request</text>
                  <text x="420" y="1076">intended</text>
                  <text x="36" y="1092">Src:</text>
                  <text x="112" y="1092">C_ADDR:C_PORT</text>
                  <text x="324" y="1092">only</text>
                  <text x="360" y="1092">for</text>
                  <text x="392" y="1092">S1,</text>
                  <text x="424" y="1092">for</text>
                  <text x="456" y="1092">the</text>
                  <text x="36" y="1108">Dst:</text>
                  <text x="120" y="1108">D1_ADDR:D1_PORT</text>
                  <text x="324" y="1108">same</text>
                  <text x="380" y="1108">resource</text>
                  <text x="428" y="1108">/r</text>
                  <text x="448" y="1108">/</text>
                  <text x="56" y="1124">Uri-Path:</text>
                  <text x="112" y="1124">"r"</text>
                  <text x="324" y="1156">Src:</text>
                  <text x="400" y="1156">P_ADDR:P_PORT</text>
                  <text x="324" y="1172">Dst:</text>
                  <text x="408" y="1172">S1_ADDR:S1_PORT</text>
                  <text x="344" y="1188">Uri-Path:</text>
                  <text x="400" y="1188">"r"</text>
                  <text x="324" y="1268">Src:</text>
                  <text x="408" y="1268">S1_ADDR:S1_PORT</text>
                  <text x="324" y="1284">Dst:</text>
                  <text x="400" y="1284">P_ADDR:P_PORT</text>
                  <text x="140" y="1348">Src:</text>
                  <text x="224" y="1348">D1_ADDR:D1_PORT</text>
                  <text x="140" y="1364">Dst:</text>
                  <text x="216" y="1364">C_ADDR:C_PORT</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
C                                   P                      S1        S2
|                                   |                      |          |
+---------------------------------->| / C is not aware     |          |
| Src: C_ADDR:C_PORT                | that P is in fact    |          |
| Dst: P_ADDR:P_PORT                | a reverse-proxy /    |          |
| Uri-Path: "r"                     |                      |          |
|                                   |                      |          |
|                                   |                      |          |
|<----------------------------------+                      |          |
| Src: P_ADDR:P_PORT                |                      |          |
| Dst: C_ADDR:C_PORT                |                      |          |
| 4.00 Bad Request                  |                      |          |
| Multicast-Timeout: - (empty)      |                      |          |
| Payload: "Please use              |                      |          |
|   Multicast-Timeout"              |                      |          |
|                                   |                      |          |
|                                   |                      |          |
+---------------------------------->|                      |          |
| Src: C_ADDR:C_PORT                |                      |          |
| Dst: P_ADDR:P_PORT                |                      |          |
| Uri-Path: "r"                     |                      |          |
| Multicast-Timeout: 60             |                      |          |
|                                   |                      |          |
|                                   |                      |          |
|                                   | Src: P_ADDR:P_PORT   |          |
|                                   | Dst: G_ADDR:G_PORT   |          |
|                                   | Uri-Path: "r"        |          |
|                                   +---------------+----->|          |
|                                   |                \     |          |
|                                   |                 `-------------->|
|                                   |                      |          |
|                                   |                      |          |
|                                   | / t = 0 : P starts   |          |
|                                   | accepting responses  |          |
|                                   | for this request /   |          |
|                                   |                      |          |
|                                   |                      |          |
|                                   |<---------------------+          |
|                                   | Src: S1_ADDR:S1_PORT |          |
|                                   | Dst: P_ADDR:P_PORT   |          |
|                                   |                      |          |
|                                   |                      |          |
|<----------------------------------+                      |          |
| Src: P_ADDR:P_PORT                |                      |          |
| Dst: C_ADDR:C_PORT                |                      |          |
| Reply-From:                       |                      |          |
|   cri'coap+tcp://D1_ADDR:D1_PORT' |                      |          |
|                                   |                      |          |
|                                   |                      |          |
|                                   |<--------------------------------+
|                                   |            Src: S2_ADDR:S2_PORT |
|                                   |            Dst: P_ADDR:P_PORT   |
|                                   |                      |          |
|                                   |                      |          |
|<----------------------------------+                      |          |
| Src: P_ADDR:P_PORT                |                      |          |
| Dst: C_ADDR:C_PORT                |                      |          |
| Reply-From:                       |                      |          |
|   cri'coap+tcp://D2_ADDR:D2_PORT' |                      |          |
|                                   |                      |          |
|                                   |                      |          |
|                   / At t = 60, P stops accepting         |          |
|                   responses for this request /           |          |
|                                   |                      |          |
|                                   |                      |          |
+---------------------------------->| / Request intended   |          |
| Src: C_ADDR:C_PORT                | only for S1, for the |          |
| Dst: D1_ADDR:D1_PORT              | same resource /r /   |          |
| Uri-Path: "r"                     |                      |          |
|                                   |                      |          |
|                                   | Src: P_ADDR:P_PORT   |          |
|                                   | Dst: S1_ADDR:S1_PORT |          |
|                                   | Uri-Path: "r"        |          |
|                                   +--------------------->|          |
|                                   |                      |          |
|                                   |                      |          |
|                                   |<---------------------+          |
|                                   | Src: S1_ADDR:S1_PORT |          |
|                                   | Dst: P_ADDR:P_PORT   |          |
|                                   |                      |          |
|                                   |                      |          |
|<----------------------------------+                      |          |
|              Src: D1_ADDR:D1_PORT |                      |          |
|              Dst: C_ADDR:C_PORT   |                      |          |
|                                   |                      |          |
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="sec-reverse-proxies-examples-ex3">
        <name>Example 3</name>
        <t>The example shown in <xref target="workflow-example-reverse-3"/> builds on the example in <xref target="sec-reverse-proxies-examples-ex2"/>.</t>
        <t>However, it considers a reverse-proxy that stands in only for the whole group of servers, but not for each individual server Sx. Therefore, it is possible for the client C to reach an individual server directly.</t>
        <t>The final exchange between C and S1 occurs with CoAP over UDP.</t>
        <figure anchor="workflow-example-reverse-3">
          <name>Workflow Example with a Reverse-Proxy Standing in Only for the Whole Group of Servers, but Not for Each Individual Server. This Configuration Requires the Proxy to Have One Pair (IP Address, Port Number) for Each Group</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="1216" width="568" viewBox="0 0 568 1216" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,1200" fill="none" stroke="black"/>
                <path d="M 264,48 L 264,976" fill="none" stroke="black"/>
                <path d="M 264,1024 L 264,1048" fill="none" stroke="black"/>
                <path d="M 264,1064 L 264,1144" fill="none" stroke="black"/>
                <path d="M 264,1160 L 264,1200" fill="none" stroke="black"/>
                <path d="M 448,48 L 448,472" fill="none" stroke="black"/>
                <path d="M 448,488 L 448,792" fill="none" stroke="black"/>
                <path d="M 448,840 L 448,1200" fill="none" stroke="black"/>
                <path d="M 560,48 L 560,1200" fill="none" stroke="black"/>
                <path d="M 8,64 L 256,64" fill="none" stroke="black"/>
                <path d="M 16,144 L 264,144" fill="none" stroke="black"/>
                <path d="M 8,288 L 256,288" fill="none" stroke="black"/>
                <path d="M 264,448 L 440,448" fill="none" stroke="black"/>
                <path d="M 408,480 L 552,480" fill="none" stroke="black"/>
                <path d="M 272,608 L 448,608" fill="none" stroke="black"/>
                <path d="M 16,688 L 264,688" fill="none" stroke="black"/>
                <path d="M 272,800 L 560,800" fill="none" stroke="black"/>
                <path d="M 16,880 L 264,880" fill="none" stroke="black"/>
                <path d="M 8,1056 L 440,1056" fill="none" stroke="black"/>
                <path d="M 16,1152 L 448,1152" fill="none" stroke="black"/>
                <path d="M 392,448 L 408,480" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="560,480 548,474.4 548,485.6" fill="black" transform="rotate(0,552,480)"/>
                <polygon class="arrowhead" points="448,1056 436,1050.4 436,1061.6" fill="black" transform="rotate(0,440,1056)"/>
                <polygon class="arrowhead" points="448,448 436,442.4 436,453.6" fill="black" transform="rotate(0,440,448)"/>
                <polygon class="arrowhead" points="280,800 268,794.4 268,805.6" fill="black" transform="rotate(180,272,800)"/>
                <polygon class="arrowhead" points="280,608 268,602.4 268,613.6" fill="black" transform="rotate(180,272,608)"/>
                <polygon class="arrowhead" points="264,288 252,282.4 252,293.6" fill="black" transform="rotate(0,256,288)"/>
                <polygon class="arrowhead" points="264,64 252,58.4 252,69.6" fill="black" transform="rotate(0,256,64)"/>
                <polygon class="arrowhead" points="24,1152 12,1146.4 12,1157.6" fill="black" transform="rotate(180,16,1152)"/>
                <polygon class="arrowhead" points="24,880 12,874.4 12,885.6" fill="black" transform="rotate(180,16,880)"/>
                <polygon class="arrowhead" points="24,688 12,682.4 12,693.6" fill="black" transform="rotate(180,16,688)"/>
                <polygon class="arrowhead" points="24,144 12,138.4 12,149.6" fill="black" transform="rotate(180,16,144)"/>
                <g class="text">
                  <text x="8" y="36">C</text>
                  <text x="264" y="36">P</text>
                  <text x="452" y="36">S1</text>
                  <text x="556" y="36">S2</text>
                  <text x="280" y="68">/</text>
                  <text x="296" y="68">C</text>
                  <text x="316" y="68">is</text>
                  <text x="344" y="68">not</text>
                  <text x="384" y="68">aware</text>
                  <text x="36" y="84">Src:</text>
                  <text x="112" y="84">C_ADDR:C_PORT</text>
                  <text x="292" y="84">that</text>
                  <text x="320" y="84">P</text>
                  <text x="340" y="84">is</text>
                  <text x="364" y="84">in</text>
                  <text x="396" y="84">fact</text>
                  <text x="36" y="100">Dst:</text>
                  <text x="112" y="100">P_ADDR:P_PORT</text>
                  <text x="280" y="100">a</text>
                  <text x="344" y="100">reverse-proxy</text>
                  <text x="408" y="100">/</text>
                  <text x="56" y="116">Uri-Path:</text>
                  <text x="112" y="116">"r"</text>
                  <text x="36" y="164">Src:</text>
                  <text x="112" y="164">P_ADDR:P_PORT</text>
                  <text x="36" y="180">Dst:</text>
                  <text x="112" y="180">C_ADDR:C_PORT</text>
                  <text x="36" y="196">4.00</text>
                  <text x="72" y="196">Bad</text>
                  <text x="120" y="196">Request</text>
                  <text x="92" y="212">Multicast-Timeout:</text>
                  <text x="176" y="212">-</text>
                  <text x="216" y="212">(empty)</text>
                  <text x="52" y="228">Payload:</text>
                  <text x="120" y="228">"Please</text>
                  <text x="168" y="228">use</text>
                  <text x="108" y="244">Multicast-Timeout"</text>
                  <text x="36" y="308">Src:</text>
                  <text x="112" y="308">C_ADDR:C_PORT</text>
                  <text x="36" y="324">Dst:</text>
                  <text x="112" y="324">P_ADDR:P_PORT</text>
                  <text x="56" y="340">Uri-Path:</text>
                  <text x="112" y="340">"r"</text>
                  <text x="92" y="356">Multicast-Timeout:</text>
                  <text x="180" y="356">60</text>
                  <text x="292" y="404">Src:</text>
                  <text x="368" y="404">P_ADDR:P_PORT</text>
                  <text x="292" y="420">Dst:</text>
                  <text x="368" y="420">G_ADDR:G_PORT</text>
                  <text x="312" y="436">Uri-Path:</text>
                  <text x="368" y="436">"r"</text>
                  <text x="280" y="532">/</text>
                  <text x="296" y="532">t</text>
                  <text x="312" y="532">=</text>
                  <text x="328" y="532">0</text>
                  <text x="344" y="532">:</text>
                  <text x="360" y="532">P</text>
                  <text x="396" y="532">starts</text>
                  <text x="312" y="548">accepting</text>
                  <text x="392" y="548">responses</text>
                  <text x="288" y="564">for</text>
                  <text x="324" y="564">this</text>
                  <text x="376" y="564">request</text>
                  <text x="416" y="564">/</text>
                  <text x="292" y="628">Src:</text>
                  <text x="376" y="628">S1_ADDR:S1_PORT</text>
                  <text x="292" y="644">Dst:</text>
                  <text x="368" y="644">P_ADDR:P_PORT</text>
                  <text x="36" y="708">Dst:</text>
                  <text x="112" y="708">P_ADDR:P_PORT</text>
                  <text x="36" y="724">Dst:</text>
                  <text x="112" y="724">C_ADDR:C_PORT</text>
                  <text x="64" y="740">Reply-From:</text>
                  <text x="144" y="756">cri'coap://S1_ADDR:S1_PORT'</text>
                  <text x="404" y="820">Src:</text>
                  <text x="488" y="820">S2_ADDR:S2_PORT</text>
                  <text x="404" y="836">Dst:</text>
                  <text x="480" y="836">P_ADDR:P_PORT</text>
                  <text x="36" y="900">Dst:</text>
                  <text x="112" y="900">P_ADDR:P_PORT</text>
                  <text x="36" y="916">Dst:</text>
                  <text x="112" y="916">C_ADDR:C_PORT</text>
                  <text x="64" y="932">Reply-From:</text>
                  <text x="144" y="948">cri'coap://S2_ADDR:S2_PORT'</text>
                  <text x="136" y="996">/</text>
                  <text x="156" y="996">At</text>
                  <text x="176" y="996">t</text>
                  <text x="192" y="996">=</text>
                  <text x="216" y="996">60,</text>
                  <text x="240" y="996">P</text>
                  <text x="272" y="996">stops</text>
                  <text x="336" y="996">accepting</text>
                  <text x="168" y="1012">responses</text>
                  <text x="224" y="1012">for</text>
                  <text x="260" y="1012">this</text>
                  <text x="312" y="1012">request</text>
                  <text x="352" y="1012">/</text>
                  <text x="36" y="1076">Src:</text>
                  <text x="112" y="1076">C_ADDR:C_PORT</text>
                  <text x="280" y="1076">/</text>
                  <text x="320" y="1076">Request</text>
                  <text x="388" y="1076">intended</text>
                  <text x="36" y="1092">Dst:</text>
                  <text x="120" y="1092">S1_ADDR:S1_PORT</text>
                  <text x="292" y="1092">only</text>
                  <text x="328" y="1092">for</text>
                  <text x="360" y="1092">S1,</text>
                  <text x="392" y="1092">for</text>
                  <text x="424" y="1092">the</text>
                  <text x="56" y="1108">Uri-Path:</text>
                  <text x="112" y="1108">"r"</text>
                  <text x="292" y="1108">same</text>
                  <text x="348" y="1108">resource</text>
                  <text x="396" y="1108">/r</text>
                  <text x="416" y="1108">/</text>
                  <text x="292" y="1172">Src:</text>
                  <text x="376" y="1172">S1_ADDR:S1_PORT</text>
                  <text x="292" y="1188">Dst:</text>
                  <text x="368" y="1188">C_ADDR:C_PORT</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
C                               P                      S1           S2
|                               |                      |             |
+------------------------------>| / C is not aware     |             |
| Src: C_ADDR:C_PORT            | that P is in fact    |             |
| Dst: P_ADDR:P_PORT            | a reverse-proxy /    |             |
| Uri-Path: "r"                 |                      |             |
|                               |                      |             |
|<------------------------------+                      |             |
| Src: P_ADDR:P_PORT            |                      |             |
| Dst: C_ADDR:C_PORT            |                      |             |
| 4.00 Bad Request              |                      |             |
| Multicast-Timeout: - (empty)  |                      |             |
| Payload: "Please use          |                      |             |
|   Multicast-Timeout"          |                      |             |
|                               |                      |             |
|                               |                      |             |
+------------------------------>|                      |             |
| Src: C_ADDR:C_PORT            |                      |             |
| Dst: P_ADDR:P_PORT            |                      |             |
| Uri-Path: "r"                 |                      |             |
| Multicast-Timeout: 60         |                      |             |
|                               |                      |             |
|                               |                      |             |
|                               | Src: P_ADDR:P_PORT   |             |
|                               | Dst: G_ADDR:G_PORT   |             |
|                               | Uri-Path: "r"        |             |
|                               +---------------+----->|             |
|                               |                \     |             |
|                               |                 `----------------->|
|                               |                      |             |
|                               |                      |             |
|                               | / t = 0 : P starts   |             |
|                               | accepting responses  |             |
|                               | for this request /   |             |
|                               |                      |             |
|                               |                      |             |
|                               |<---------------------+             |
|                               | Src: S1_ADDR:S1_PORT |             |
|                               | Dst: P_ADDR:P_PORT   |             |
|                               |                      |             |
|                               |                      |             |
|<------------------------------+                      |             |
| Dst: P_ADDR:P_PORT            |                      |             |
| Dst: C_ADDR:C_PORT            |                      |             |
| Reply-From:                   |                      |             |
|   cri'coap://S1_ADDR:S1_PORT' |                      |             |
|                               |                      |             |
|                               |                      |             |
|                               |<-----------------------------------+
|                               |               Src: S2_ADDR:S2_PORT |
|                               |               Dst: P_ADDR:P_PORT   |
|                               |                      |             |
|                               |                      |             |
|<------------------------------+                      |             |
| Dst: P_ADDR:P_PORT            |                      |             |
| Dst: C_ADDR:C_PORT            |                      |             |
| Reply-From:                   |                      |             |
|   cri'coap://S2_ADDR:S2_PORT' |                      |             |
|                               |                      |             |
|                               |                      |             |
|               / At t = 60, P stops accepting         |             |
|               responses for this request /           |             |
|                               |                      |             |
|                               |                      |             |
+----------------------------------------------------->|             |
| Src: C_ADDR:C_PORT            | / Request intended   |             |
| Dst: S1_ADDR:S1_PORT          | only for S1, for the |             |
| Uri-Path: "r"                 | same resource /r /   |             |
|                               |                      |             |
|                               |                      |             |
|<-----------------------------------------------------+             |
|                               | Src: S1_ADDR:S1_PORT |             |
|                               | Dst: C_ADDR:C_PORT   |             |
|                               |                      |             |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="sec-document-updates" removeInRFC="true">
      <name>Document Updates</name>
      <section anchor="sec-04-05">
        <name>Version -04 to -05</name>
        <ul spacing="normal">
          <li>
            <t>Abstract and introduction: the scope is one possible realization of proxy.</t>
          </li>
          <li>
            <t>Generalized transport indication: still based on the CRI in the Reply-From Option, but not on 'scheme' only.</t>
          </li>
          <li>
            <t>Suggested option numbers for the three new CoAP options.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-03-04">
        <name>Version -03 to -04</name>
        <ul spacing="normal">
          <li>
            <t>More appropriate pointers to sections of draft-ietf-core-groupcomm-bis.</t>
          </li>
          <li>
            <t>More precise semantics for the Reply-From Option.</t>
          </li>
          <li>
            <t>Defined early cancellation of ongoing response forwarding.</t>
          </li>
          <li>
            <t>Suggested value ranges for codepoints to register.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-02-03">
        <name>Version -02 to -03</name>
        <ul spacing="normal">
          <li>
            <t>Made RFC 7967 a normative reference.</t>
          </li>
          <li>
            <t>Improved error handling for request reception at the proxy.</t>
          </li>
          <li>
            <t>Improved security considerations for the new CoAP options.</t>
          </li>
          <li>
            <t>Aligned handling of multiple responses with draft-ietf-core-groupcomm-bis.</t>
          </li>
          <li>
            <t>Revised HTTP Reply-From header field to be a Structured Header Field.</t>
          </li>
          <li>
            <t>Revised HTTP Group-ETag header field to be a Structured Header Field.</t>
          </li>
          <li>
            <t>Clarifications and editorial improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-01-02">
        <name>Version -01 to -02</name>
        <ul spacing="normal">
          <li>
            <t>Reply-To Option renamed as Reply-From.</t>
          </li>
          <li>
            <t>Multicast-Timeout Option set to 0 ultimately yields an empty value.</t>
          </li>
          <li>
            <t>Removed moot text on reverse-proxies that might use default timeouts.</t>
          </li>
          <li>
            <t>Improved description on using Proxy-Cri and Proxy-Scheme-Number.</t>
          </li>
          <li>
            <t>Improved error handling for inadequate timeouts with proxy chains.</t>
          </li>
          <li>
            <t>Revised the examples of message exchange with a reverse-proxy.</t>
          </li>
          <li>
            <t>Fixes in the IANA considerations.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
      <section anchor="sec-00-01">
        <name>Version -00 to -01</name>
        <ul spacing="normal">
          <li>
            <t>Definition of "individual request" in the terminology.</t>
          </li>
          <li>
            <t>UDP/IP multicast treated as the default transport protocol.</t>
          </li>
          <li>
            <t>Always use the Multicast-Timeout Option, also with reverse-proxies.</t>
          </li>
          <li>
            <t>Response-Forwarding Option:  </t>
            <ul spacing="normal">
              <li>
                <t>Renamed as "Reply-To".</t>
              </li>
              <li>
                <t>Revised encoding to use CRIs.</t>
              </li>
              <li>
                <t>Revised semantics to better address setups with reverse-proxies.</t>
              </li>
              <li>
                <t>Added before possible response caching.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Clarified response processing at reverse-proxies.</t>
          </li>
          <li>
            <t>Updated IANA considerations.</t>
          </li>
          <li>
            <t>Editorial fixes and improvements.</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors sincerely thank <contact fullname="Christian Amsüss"/>, <contact fullname="Carsten Bormann"/>, <contact fullname="Rikard Höglund"/>, <contact fullname="Jim Schaad"/>, and <contact fullname="Göran Selander"/> for their comments and feedback.</t>
      <t>The work on this document has been partly supported by the Sweden's Innovation Agency VINNOVA and the Celtic-Next projects CRITISEC and CYPRESS; and by the H2020 project SIFIS-Home (Grant agreement 952652).</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
