<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-quic-v2-09" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.3 -->
  <front>
    <title abbrev="QUICv2">QUIC Version 2</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-quic-v2-09"/>
    <author initials="M." surname="Duke" fullname="Martin Duke">
      <organization>Google LLC</organization>
      <address>
        <email>martin.h.duke@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="December" day="14"/>
    <area>Transport</area>
    <workgroup>QUIC</workgroup>
    <abstract>
      <t>This document specifies QUIC version 2, which is identical to QUIC version 1
except for some trivial details. Its purpose is to combat various ossification
vectors and exercise the version negotiation framework. It also serves as a
template for the minimum changes in any future version of QUIC.</t>
      <t>Note that "version 2" is an informal name for this proposal that indicates it
is the second standards-track QUIC version. The protocol specified here uses a
version number other than 2 in the wire image, in order to minimize ossification
risk.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://quicwg.org/quic-v2/draft-ietf-quic-v2.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-quic-v2/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        QUIC Working Group mailing list (<eref target="mailto:quic@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/quic/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/quic/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/quicwg/quic-v2"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>QUIC version 1<xref target="QUIC"/> has numerous extension points, including the version
number that occupies the second through fifth bytes of every long header (see
<xref target="QUIC-INVARIANTS"/>). If experimental versions are rare, and QUIC
version 1 constitutes the vast majority of QUIC traffic, there is the potential
for middleboxes to ossify on the version bytes always being 0x00000001.</t>
      <t>In QUIC version 1, Initial packets are encrypted with the version-specific salt
as described in <xref section="5.2" sectionFormat="of" target="QUIC-TLS"/>. Protecting Initial packets in this
way allows observers to inspect their contents, which includes the TLS Client
Hello or Server Hello messages. Again, there is the potential for middleboxes to
ossify on the version 1 key derivation and packet formats.</t>
      <t>Finally, <xref target="QUIC-VN"/> provides two mechanisms
for endpoints to negotiate the QUIC version to use. The "incompatible" version
negotiation method can support switching from any QUIC version to any
other version with full generality, at the cost of an additional round-trip at
the start of the connection. "Compatible" version negotiation eliminates the
round-trip penalty but levies some restrictions on how much the two versions can
differ semantically.</t>
      <t>QUIC version 2 is meant to mitigate ossification concerns and exercise the
version negotiation mechanisms. The changes provide an example of the minimum
set of changes necessary to specify a new QUIC version. However, note that the
choice of the version number on the wire is randomly chosen instead of "2", and
the two bits that identify each long header packet type are different from
version 1; both of these properties are meant to combat ossification and are not
strictly required of a new QUIC version.</t>
      <t>Any endpoint that supports two versions needs to implement version negotiation
to protect against downgrade attacks.</t>
    </section>
    <section anchor="conventions">
      <name>Conventions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="differences-with-quic-version-1">
      <name>Differences with QUIC Version 1</name>
      <t>Except for a few differences, QUIC version 2 endpoints <bcp14>MUST</bcp14> implement the QUIC
version 1 specification as described in <xref target="QUIC"/>, <xref target="QUIC-TLS"/>, and
<xref target="QUIC-RECOVERY"/>. The remainder of this section lists the differences.</t>
      <section anchor="version-field">
        <name>Version Field</name>
        <t>The Version field of long headers is 0x6b3343cf. This was generated by taking
the first four bytes of the sha256sum of "QUICv2 version number".</t>
        <ul empty="true">
          <li>
            <t><strong>RFC Editor's Note:</strong>  Please remove the sentence below prior to publication
of a final version of this document.</t>
          </li>
        </ul>
        <t>This version number will not change in subsequent versions of this draft,
unless there is a behavior change that breaks compatibility.</t>
      </section>
      <section anchor="long-header-packet-types">
        <name>Long Header Packet Types</name>
        <t>All version 2 long header packet types are different. The Type field values are:</t>
        <ul spacing="normal">
          <li>Initial: 0b01</li>
          <li>0-RTT: 0b10</li>
          <li>Handshake: 0b11</li>
          <li>Retry: 0b00</li>
        </ul>
      </section>
      <section anchor="cryptography-changes">
        <name>Cryptography changes</name>
        <t>The values below were chosen randomly.</t>
        <section anchor="initial-salt">
          <name>Initial Salt</name>
          <t>The salt used to derive Initial keys in <xref section="5.2" sectionFormat="of" target="QUIC-TLS"/> changes to:</t>
          <artwork><![CDATA[
initial_salt = 0x0dede3def700a6db819381be6e269dcbf9bd2ed9
]]></artwork>
          <t>This is the first 20 bytes of the sha256sum of "QUICv2 salt".</t>
        </section>
        <section anchor="hkdf-labels">
          <name>HKDF Labels</name>
          <ul empty="true">
            <li>
              <t><strong>RFC Editor's Note:</strong>  Please ensure that the strings in quotes are not split
up in a line break in this section.</t>
            </li>
          </ul>
          <t>The labels used in <xref target="QUIC-TLS"/> to derive packet protection keys (Section
<xref section="5.1" sectionFormat="bare" target="QUIC-TLS"/>), header protection keys
(Section <xref section="5.4" sectionFormat="bare" target="QUIC-TLS"/>), Retry Integrity
Tag keys (Section <xref section="5.8" sectionFormat="bare" target="QUIC-TLS"/>), and key
updates (Section <xref section="6.1" sectionFormat="bare" target="QUIC-TLS"/>) change from
"quic key" to "quicv2 key", from "quic iv" to "quicv2 iv", from "quic hp" to
"quicv2 hp", and from "quic ku" to "quicv2 ku", to meet the guidance for new
versions in Section <xref section="9.6" sectionFormat="bare" target="QUIC-TLS"/> of that
document.</t>
        </section>
        <section anchor="retry-integrity-tag">
          <name>Retry Integrity Tag</name>
          <t>The key and nonce used for the Retry Integrity Tag (<xref section="5.8" sectionFormat="of" target="QUIC-TLS"/>)
change to:</t>
          <artwork><![CDATA[
secret =
  0xc4dd2484d681aefa4ff4d69c2c20299984a765a5d3c31982f38fc74162155e9f
key = 0x8fb4b01b56ac48e260fbcbcead7ccc92
nonce = 0xd86969bc2d7c6d9990efb04a
]]></artwork>
          <t>The secret is the sha256sum of "QUICv2 retry secret". The key and nonce are
derived from this secret with the labels "quicv2 key" and "quicv2 iv",
respectively.</t>
        </section>
      </section>
    </section>
    <section anchor="version-negotiation-considerations">
      <name>Version Negotiation Considerations</name>
      <t>QUIC version 2 is not intended to deprecate version 1. Endpoints that support
version 2 might continue support for version 1 to maximize compatibility with
other endpoints. In particular, HTTP clients often use Alt-Svc <xref target="RFC7838"/> to
discover QUIC support. As this mechanism does not currently distinguish between
QUIC versions, HTTP servers <bcp14>SHOULD</bcp14> support multiple versions to reduce the
probability of incompatibility and the cost associated with QUIC version
negotiation or TCP fallback. For example, an origin advertising support for "h3"
in Alt-Svc should support QUIC version 1 as it was the original QUIC version
used by HTTP/3, and therefore some clients will only support that version.</t>
      <t>Any QUIC endpoint that supports QUIC version 2 <bcp14>MUST</bcp14> send, process, and validate
the version_information transport parameter specified in <xref target="QUIC-VN"/> to prevent
version downgrade attacks.</t>
      <t>Note that version 2 meets the <xref target="QUIC-VN"/> definition of a compatible version
with version 1, and version 1 is compatible with version 2. Therefore, servers
can use compatible negotiation to switch a connection between the two versions.
Endpoints that support both versions <bcp14>SHOULD</bcp14> support compatible version
negotiation to avoid a round trip.</t>
      <section anchor="compatible-negotiation-requirements">
        <name>Compatible Negotiation Requirements</name>
        <t>Compatible version negotiation between versions 1 and 2 follow the same
requirements in either direction. This section uses the terms "original
version" and "negotiated version" from <xref target="QUIC-VN"/>.</t>
        <t>If the server sends a Retry packet, it <bcp14>MUST</bcp14> use the original version. The
client ignores Retry packets using other versions. The client <bcp14>MUST NOT</bcp14> use a
different version in the subsequent Initial packet that contains the Retry
token. The server <bcp14>MAY</bcp14> encode the QUIC version in its Retry token to validate
that the client did not switch versions, and drop the packet if it switched,
to enforce client compliance.</t>
        <t>QUIC version 2 uses the same transport parameters to authenticate the Retry as
QUIC version 1. After switching to a negotiated version after a Retry, the
server <bcp14>MUST</bcp14> include the relevant transport parameters to validate that the
server sent the Retry and the connection IDs used in the exchange, as described
in <xref section="7.3" sectionFormat="of" target="QUIC"/>.</t>
        <t>The server cannot send CRYPTO frames until it has processed the client's
transport parameters. The server <bcp14>MUST</bcp14> send all CRYPTO frames using
the negotiated version.</t>
        <t>The client learns the negotiated version by observing the first long header
Version field that differs from the original version. If the client receives a
CRYPTO frame from the server in the original version, that indicates that the
negotiated version is equal to the original version.</t>
        <t>Before the server is able to process transport parameters from the client, it
might need to respond to Initial packets from the client. For these packets, the
server uses the original version.</t>
        <t>Once the client has learned the negotiated version, it <bcp14>SHOULD</bcp14> send subsequent
Initial packets using that version. The server <bcp14>MUST NOT</bcp14> discard its original
version Initial receive keys until it successfully processes a Handshake
packet with the negotiated version.</t>
        <t>Both endpoints <bcp14>MUST</bcp14> send Handshake and 1-RTT packets using the negotiated
version. An endpoint <bcp14>MUST</bcp14> drop packets using any other version. Endpoints have
no need to generate the keying material that would allow them to decrypt or
authenticate such packets.</t>
        <t>The client <bcp14>MUST NOT</bcp14> send 0-RTT packets using the negotiated version, even after
processing a packet of that version from the server. Servers can accept 0-RTT
and then process 0-RTT packets from the original version.</t>
      </section>
    </section>
    <section anchor="tls-resumption-and-newtoken-tokens">
      <name>TLS Resumption and NEW_TOKEN Tokens</name>
      <t>TLS session tickets and NEW_TOKEN tokens are specific to the QUIC version of the
connection that provided them. Clients <bcp14>MUST NOT</bcp14> use a session ticket or token
from a QUIC version 1 connection to initiate a QUIC version 2 connection, or vice
versa.</t>
      <t>Servers <bcp14>MUST</bcp14> validate the originating version of any session ticket or token and
not accept one issued from a different version. A rejected ticket results in
falling back to a full TLS handshake, without 0-RTT. A rejected token results in
the client address remaining unverified, which limits the amount of data the
server can send.</t>
      <t>After compatible version negotiation, any resulting session ticket
maps to the negotiated version rather than original one.</t>
    </section>
    <section anchor="ossification-considerations">
      <name>Ossification Considerations</name>
      <t>QUIC version 2 provides protection against some forms of ossification. Devices
that assume that all long headers will encode version 1, or that the version 1
Initial key derivation formula will remain version-invariant, will not correctly
process version 2 packets.</t>
      <t>However, many middleboxes, such as firewalls, focus on the first packet in a
connection, which will often remain in the version 1 format due to the
considerations above.</t>
      <t>Clients interested in combating middlebox ossification can initiate a connection
using version 2 if they are either reasonably certain the server supports it, or
are willing to suffer a round-trip penalty if they are incorrect.  In
particular, a server that issues a session ticket for version 2 indicates an
intent to maintain version 2 support while the ticket remains valid, even if
support cannot be guaranteed.</t>
    </section>
    <section anchor="applicability">
      <name>Applicability</name>
      <t>This version of QUIC provides no change from QUIC version 1 relating to the
capabilities available to applications. Therefore, all Application Layer
Protocol Negotiation (ALPN) (<xref target="RFC7301"/>) codepoints specified to operate over
QUIC version 1 can also operate over this version of QUIC. In particular, both
the "h3" <xref target="H3"/> and "doq" <xref target="RFC9250"/> ALPNs can operate over
QUIC version 2.</t>
      <t>Unless otherwise stated, all QUIC extensions defined to work with version 1 also
work with version 2.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>QUIC version 2 introduces no changes to the security or privacy properties of
QUIC version 1.</t>
      <t>The mandatory version negotiation mechanism guards against downgrade attacks,
but downgrades have no security implications, as the version properties are
identical.</t>
      <t>Support for QUIC version 2 can help an observer to fingerprint both client and
server devices.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests that IANA add the following entry to the QUIC version
registry maintained at
&lt;<eref target="https://www.iana.org/assignments/quic/quic.xhtml#quic-versions"/>&gt;.</t>
      <dl spacing="compact">
        <dt>Value:</dt>
        <dd>
          <t>0x6b3343cf</t>
        </dd>
        <dt>Status:</dt>
        <dd>
          <t>permanent</t>
        </dd>
        <dt>Specification:</dt>
        <dd>
          <t>This Document</t>
        </dd>
        <dt>Change Controller:</dt>
        <dd>
          <t>IETF</t>
        </dd>
        <dt>Contact:</dt>
        <dd>
          <t>QUIC WG</t>
        </dd>
      </dl>
      <dl spacing="compact">
        <dt>Value:</dt>
        <dd>
          <t>0x709a50c4</t>
        </dd>
        <dt>Status:</dt>
        <dd>
          <t>provisional</t>
        </dd>
        <dt>Specification:</dt>
        <dd>
          <t>This Document</t>
        </dd>
        <dt>Change Controller:</dt>
        <dd>
          <t>IETF</t>
        </dd>
        <dt>Contact:</dt>
        <dd>
          <t>QUIC WG</t>
        </dd>
      </dl>
    </section>
  </middle>
  <back>
    <displayreference target="H3" to="HTTP/3"/>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="QUIC">
          <front>
            <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the core of the QUIC transport protocol.  QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances.  Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9000"/>
          <seriesInfo name="DOI" value="10.17487/RFC9000"/>
        </reference>
        <reference anchor="QUIC-TLS">
          <front>
            <title>Using TLS to Secure QUIC</title>
            <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." role="editor" surname="Turner">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes how Transport Layer Security (TLS) is used to secure QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9001"/>
          <seriesInfo name="DOI" value="10.17487/RFC9001"/>
        </reference>
        <reference anchor="QUIC-VN">
          <front>
            <title>Compatible Version Negotiation for QUIC</title>
            <author fullname="David Schinazi" initials="D." surname="Schinazi">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="6" month="November" year="2022"/>
            <abstract>
              <t>   QUIC does not provide a complete version negotiation mechanism but
   instead only provides a way for the server to indicate that the
   version the client chose is unacceptable.  This document describes a
   version negotiation mechanism that allows a client and server to
   select a mutually supported version.  Optionally, if the client's
   chosen version and the negotiated version share a compatible first
   flight format, the negotiation can take place without incurring an
   extra round trip.  This document updates RFC 8999.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-quic-version-negotiation-13"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="QUIC-RECOVERY">
          <front>
            <title>QUIC Loss Detection and Congestion Control</title>
            <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar">
              <organization/>
            </author>
            <author fullname="I. Swett" initials="I." role="editor" surname="Swett">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document describes loss detection and congestion control mechanisms for QUIC.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9002"/>
          <seriesInfo name="DOI" value="10.17487/RFC9002"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="H3">
          <front>
            <title>HTTP/3</title>
            <author fullname="M. Bishop" initials="M." role="editor" surname="Bishop">
              <organization/>
            </author>
            <date month="June" year="2022"/>
            <abstract>
              <t>The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment.  This document describes a mapping of HTTP semantics over QUIC.  This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9114"/>
          <seriesInfo name="DOI" value="10.17487/RFC9114"/>
        </reference>
        <reference anchor="QUIC-INVARIANTS">
          <front>
            <title>Version-Independent Properties of QUIC</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson">
              <organization/>
            </author>
            <date month="May" year="2021"/>
            <abstract>
              <t>This document defines the properties of the QUIC transport protocol that are common to all versions of the protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8999"/>
          <seriesInfo name="DOI" value="10.17487/RFC8999"/>
        </reference>
        <reference anchor="RFC7838">
          <front>
            <title>HTTP Alternative Services</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham">
              <organization/>
            </author>
            <author fullname="P. McManus" initials="P." surname="McManus">
              <organization/>
            </author>
            <author fullname="J. Reschke" initials="J." surname="Reschke">
              <organization/>
            </author>
            <date month="April" year="2016"/>
            <abstract>
              <t>This document specifies "Alternative Services" for HTTP, which allow an origin's resources to be authoritatively available at a separate network location, possibly accessed with a different protocol configuration.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7838"/>
          <seriesInfo name="DOI" value="10.17487/RFC7838"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC9250">
          <front>
            <title>DNS over Dedicated QUIC Connections</title>
            <author fullname="C. Huitema" initials="C." surname="Huitema">
              <organization/>
            </author>
            <author fullname="S. Dickinson" initials="S." surname="Dickinson">
              <organization/>
            </author>
            <author fullname="A. Mankin" initials="A." surname="Mankin">
              <organization/>
            </author>
            <date month="May" year="2022"/>
            <abstract>
              <t>This document describes the use of QUIC to provide transport confidentiality for DNS. The encryption provided by QUIC has similar properties to those provided by TLS, while QUIC transport eliminates the head-of-line blocking issues inherent with TCP and provides more efficient packet-loss recovery than UDP. DNS over QUIC (DoQ) has privacy properties similar to DNS over TLS (DoT) specified in RFC 7858, and latency characteristics similar to classic DNS over UDP. This specification describes the use of DoQ as a general-purpose transport for DNS and includes the use of DoQ for stub to recursive, recursive to authoritative, and zone transfer scenarios.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9250"/>
          <seriesInfo name="DOI" value="10.17487/RFC9250"/>
        </reference>
      </references>
    </references>
    <section anchor="test-vectors">
      <name>Sample Packet Protection</name>
      <t>This section shows examples of packet protection so that implementations can be
verified incrementally. Samples of Initial packets from both client and server
plus a Retry packet are defined. These packets use an 8-byte client-chosen
Destination Connection ID of 0x8394c8f03e515708. Some intermediate values are
included. All values are shown in hexadecimal.</t>
      <section anchor="keys">
        <name>Keys</name>
        <t>The labels generated during the execution of the HKDF-Expand-Label function
(that is, HkdfLabel.label) and part of the value given to the HKDF-Expand
function in order to produce its output are:</t>
        <t>client in:  00200f746c73313320636c69656e7420696e00</t>
        <t>server in:  00200f746c7331332073657276657220696e00</t>
        <t>quicv2 key:  001010746c73313320717569637632206b657900</t>
        <t>quicv2 iv:  000c0f746c7331332071756963763220697600</t>
        <t>quicv2 hp:  00100f746c7331332071756963763220687000</t>
        <t>The initial secret is common:</t>
        <artwork><![CDATA[
initial_secret = HKDF-Extract(initial_salt, cid)
    = 2062e8b3cd8d52092614b8071d0aa1fb
      7c2e3ac193f78b280e72d8f5751f6aba
]]></artwork>
        <t>The secrets for protecting client packets are:</t>
        <artwork><![CDATA[
client_initial_secret
    = HKDF-Expand-Label(initial_secret, "client in", "", 32)
    = 14ec9d6eb9fd7af83bf5a668bc17a7e2
      83766aade7ecd0891f70f9ff7f4bf47b

key = HKDF-Expand-Label(client_initial_secret, "quicv2 key", "", 16)
    = 8b1a0bc121284290a29e0971b5cd045d

iv  = HKDF-Expand-Label(client_initial_secret, "quicv2 iv", "", 12)
    = 91f73e2351d8fa91660e909f

hp  = HKDF-Expand-Label(client_initial_secret, "quicv2 hp", "", 16)
    = 45b95e15235d6f45a6b19cbcb0294ba9
]]></artwork>
        <t>The secrets for protecting server packets are:</t>
        <artwork><![CDATA[
server_initial_secret
    = HKDF-Expand-Label(initial_secret, "server in", "", 32)
    = 0263db1782731bf4588e7e4d93b74639
      07cb8cd8200b5da55a8bd488eafc37c1

key = HKDF-Expand-Label(server_initial_secret, "quicv2 key", "", 16)
    = 82db637861d55e1d011f19ea71d5d2a7

iv  = HKDF-Expand-Label(server_initial_secret, "quicv2 iv", "", 12)
    = dd13c276499c0249d3310652

hp  = HKDF-Expand-Label(server_initial_secret, "quicv2 hp", "", 16)
    = edf6d05c83121201b436e16877593c3a
]]></artwork>
      </section>
      <section anchor="sample-client-initial">
        <name>Client Initial</name>
        <t>The client sends an Initial packet.  The unprotected payload of this packet
contains the following CRYPTO frame, plus enough PADDING frames to make a
1162-byte payload:</t>
        <artwork><![CDATA[
060040f1010000ed0303ebf8fa56f129 39b9584a3896472ec40bb863cfd3e868
04fe3a47f06a2b69484c000004130113 02010000c000000010000e00000b6578
616d706c652e636f6dff01000100000a 00080006001d00170018001000070005
04616c706e0005000501000000000033 00260024001d00209370b2c9caa47fba
baf4559fedba753de171fa71f50f1ce1 5d43e994ec74d748002b000302030400
0d0010000e0403050306030203080408 050806002d00020101001c0002400100
3900320408ffffffffffffffff050480 00ffff07048000ffff08011001048000
75300901100f088394c8f03e51570806 048000ffff
]]></artwork>
        <t>The unprotected header indicates a length of 1182 bytes: the 4-byte packet
number, 1162 bytes of frames, and the 16-byte authentication tag.  The header
includes the connection ID and a packet number of 2:</t>
        <artwork><![CDATA[
d36b3343cf088394c8f03e5157080000449e00000002
]]></artwork>
        <t>Protecting the payload produces output that is sampled for header protection.
Because the header uses a 4-byte packet number encoding, the first 16 bytes of
the protected payload is sampled and then applied to the header as follows:</t>
        <artwork><![CDATA[
sample = ffe67b6abcdb4298b485dd04de806071

mask = AES-ECB(hp, sample)[0..4]
     = 94a0c95e80

header[0] ^= mask[0] & 0x0f
     = d7
header[18..21] ^= mask[1..4]
     = a0c95e82
header = d76b3343cf088394c8f03e5157080000449ea0c95e82
]]></artwork>
        <t>The resulting protected packet is:</t>
        <artwork><![CDATA[
d76b3343cf088394c8f03e5157080000 449ea0c95e82ffe67b6abcdb4298b485
dd04de806071bf03dceebfa162e75d6c 96058bdbfb127cdfcbf903388e99ad04
9f9a3dd4425ae4d0992cfff18ecf0fdb 5a842d09747052f17ac2053d21f57c5d
250f2c4f0e0202b70785b7946e992e58 a59ac52dea6774d4f03b55545243cf1a
12834e3f249a78d395e0d18f4d766004 f1a2674802a747eaa901c3f10cda5500
cb9122faa9f1df66c392079a1b40f0de 1c6054196a11cbea40afb6ef5253cd68
18f6625efce3b6def6ba7e4b37a40f77 32e093daa7d52190935b8da58976ff33
12ae50b187c1433c0f028edcc4c2838b 6a9bfc226ca4b4530e7a4ccee1bfa2a3
d396ae5a3fb512384b2fdd851f784a65 e03f2c4fbe11a53c7777c023462239dd
6f7521a3f6c7d5dd3ec9b3f233773d4b 46d23cc375eb198c63301c21801f6520
bcfb7966fc49b393f0061d974a2706df 8c4a9449f11d7f3d2dcbb90c6b877045
636e7c0c0fe4eb0f697545460c806910 d2c355f1d253bc9d2452aaa549e27a1f
ac7cf4ed77f322e8fa894b6a83810a34 b361901751a6f5eb65a0326e07de7c12
16ccce2d0193f958bb3850a833f7ae43 2b65bc5a53975c155aa4bcb4f7b2c4e5
4df16efaf6ddea94e2c50b4cd1dfe060 17e0e9d02900cffe1935e0491d77ffb4
fdf85290fdd893d577b1131a610ef6a5 c32b2ee0293617a37cbb08b847741c3b
8017c25ca9052ca1079d8b78aebd4787 6d330a30f6a8c6d61dd1ab5589329de7
14d19d61370f8149748c72f132f0fc99 f34d766c6938597040d8f9e2bb522ff9
9c63a344d6a2ae8aa8e51b7b90a4a806 105fcbca31506c446151adfeceb51b91
abfe43960977c87471cf9ad4074d30e1 0d6a7f03c63bd5d4317f68ff325ba3bd
80bf4dc8b52a0ba031758022eb025cdd 770b44d6d6cf0670f4e990b22347a7db
848265e3e5eb72dfe8299ad7481a4083 22cac55786e52f633b2fb6b614eaed18
d703dd84045a274ae8bfa73379661388 d6991fe39b0d93debb41700b41f90a15
c4d526250235ddcd6776fc77bc97e7a4 17ebcb31600d01e57f32162a8560cacc
7e27a096d37a1a86952ec71bd89a3e9a 30a2a26162984d7740f81193e8238e61
f6b5b984d4d3dfa033c1bb7e4f0037fe bf406d91c0dccf32acf423cfa1e70710
10d3f270121b493ce85054ef58bada42 310138fe081adb04e2bd901f2f13458b
3d6758158197107c14ebb193230cd115 7380aa79cae1374a7c1e5bbcb80ee23e
06ebfde206bfb0fcbc0edc4ebec30966 1bdd908d532eb0c6adc38b7ca7331dce
8dfce39ab71e7c32d318d136b6100671 a1ae6a6600e3899f31f0eed19e3417d1
34b90c9058f8632c798d4490da498730 7cba922d61c39805d072b589bd52fdf1
e86215c2d54e6670e07383a27bbffb5a ddf47d66aa85a0c6f9f32e59d85a44dd
5d3b22dc2be80919b490437ae4f36a0a e55edf1d0b5cb4e9a3ecabee93dfc6e3
8d209d0fa6536d27a5d6fbb17641cde2 7525d61093f1b28072d111b2b4ae5f89
d5974ee12e5cf7d5da4d6a31123041f3 3e61407e76cffcdcfd7e19ba58cf4b53
6f4c4938ae79324dc402894b44faf8af bab35282ab659d13c93f70412e85cb19
9a37ddec600545473cfb5a05e08d0b20 9973b2172b4d21fb69745a262ccde96b
a18b2faa745b6fe189cf772a9f84cbfc
]]></artwork>
      </section>
      <section anchor="server-initial">
        <name>Server Initial</name>
        <t>The server sends the following payload in response, including an ACK frame, a
CRYPTO frame, and no PADDING frames:</t>
        <artwork><![CDATA[
02000000000600405a020000560303ee fce7f7b37ba1d1632e96677825ddf739
88cfc79825df566dc5430b9a045a1200 130100002e00330024001d00209d3c94
0d89690b84d08a60993c144eca684d10 81287c834d5311bcf32bb9da1a002b00
020304
]]></artwork>
        <t>The header from the server includes a new connection ID and a 2-byte packet
number encoding for a packet number of 1:</t>
        <artwork><![CDATA[
d16b3343cf0008f067a5502a4262b50040750001
]]></artwork>
        <t>As a result, after protection, the header protection sample is taken starting
from the third protected byte:</t>
        <artwork><![CDATA[
sample = 6f05d8a4398c47089698baeea26b91eb
mask   = 4dd92e91ea
header = dc6b3343cf0008f067a5502a4262b5004075d92f
]]></artwork>
        <t>The final protected packet is then:</t>
        <artwork><![CDATA[
dc6b3343cf0008f067a5502a4262b500 4075d92faaf16f05d8a4398c47089698
baeea26b91eb761d9b89237bbf872630 17915358230035f7fd3945d88965cf17
f9af6e16886c61bfc703106fbaf3cb4c fa52382dd16a393e42757507698075b2
c984c707f0a0812d8cd5a6881eaf21ce da98f4bd23f6fe1a3e2c43edd9ce7ca8
4bed8521e2e140
]]></artwork>
      </section>
      <section anchor="retry">
        <name>Retry</name>
        <t>This shows a Retry packet that might be sent in response to the Initial packet
in <xref target="sample-client-initial"/>. The integrity check includes the client-chosen
connection ID value of 0x8394c8f03e515708, but that value is not
included in the final Retry packet:</t>
        <artwork><![CDATA[
cf6b3343cf0008f067a5502a4262b574 6f6b656ec8646ce8bfe33952d9555436
65dcc7b6
]]></artwork>
      </section>
      <section anchor="chacha20-poly1305-short-header-packet">
        <name>ChaCha20-Poly1305 Short Header Packet</name>
        <t>This example shows some of the steps required to protect a packet with
a short header.  This example uses AEAD_CHACHA20_POLY1305.</t>
        <t>In this example, TLS produces an application write secret from which a server
uses HKDF-Expand-Label to produce four values: a key, an IV, a header
protection key, and the secret that will be used after keys are updated (this
last value is not used further in this example).</t>
        <artwork><![CDATA[
secret
    = 9ac312a7f877468ebe69422748ad00a1
      5443f18203a07d6060f688f30f21632b

key = HKDF-Expand-Label(secret, "quicv2 key", "", 32)
    = 3bfcddd72bcf02541d7fa0dd1f5f9eee
      a817e09a6963a0e6c7df0f9a1bab90f2

iv  = HKDF-Expand-Label(secret, "quicv2 iv", "", 12)
    = a6b5bc6ab7dafce30ffff5dd

hp  = HKDF-Expand-Label(secret, "quicv2 hp", "", 32)
    = d659760d2ba434a226fd37b35c69e2da
      8211d10c4f12538787d65645d5d1b8e2

ku  = HKDF-Expand-Label(secret, "quicv2 ku", "", 32)
    = c69374c49e3d2a9466fa689e49d476db
      5d0dfbc87d32ceeaa6343fd0ae4c7d88
]]></artwork>
        <t>The following shows the steps involved in protecting a minimal packet with an
empty Destination Connection ID. This packet contains a single PING frame (that
is, a payload of just 0x01) and has a packet number of 654360564. In this
example, using a packet number of length 3 (that is, 49140 is encoded) avoids
having to pad the payload of the packet; PADDING frames would be needed if the
packet number is encoded on fewer bytes.</t>
        <artwork><![CDATA[
pn                 = 654360564 (decimal)
nonce              = a6b5bc6ab7dafce328ff4a29
unprotected header = 4200bff4
payload plaintext  = 01
payload ciphertext = 0ae7b6b932bc27d786f4bc2bb20f2162ba
]]></artwork>
        <t>The resulting ciphertext is the minimum size possible. One byte is skipped to
produce the sample for header protection.</t>
        <artwork><![CDATA[
sample = e7b6b932bc27d786f4bc2bb20f2162ba
mask   = 97580e32bf
header = 5558b1c6
]]></artwork>
        <t>The protected packet is the smallest possible packet size of 21 bytes.</t>
        <artwork><![CDATA[
packet = 5558b1c60ae7b6b932bc27d786f4bc2bb20f2162ba
]]></artwork>
      </section>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank Christian Huitema, Lucas Pardue, Kyle Rose,
Anthony Rossi, Zahed Sarker, David Schinazi, Tatsuhiro Tsujikawa, and Martin
Thomson for their helpful suggestions.</t>
    </section>
    <section anchor="changelog">
      <name>Changelog</name>
      <ul empty="true">
        <li>
          <t><strong>RFC Editor's Note:</strong>  Please remove this section prior to
publication of a final version of this document.</t>
        </li>
      </ul>
      <section anchor="since-draft-ietf-quic-v2-08">
        <name>since draft-ietf-quic-v2-08</name>
        <ul spacing="normal">
          <li>Updated IANA considerations in accordance with new constants</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-07">
        <name>since draft-ietf-quic-v2-07</name>
        <ul spacing="normal">
          <li>Generated new constants and test vectors</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-06">
        <name>since draft-ietf-quic-v2-06</name>
        <ul spacing="normal">
          <li>Clients <bcp14>MUST NOT</bcp14> use TLS resumption tickets across versions</li>
          <li>Servers <bcp14>SHOULD</bcp14> support multiple versions</li>
          <li>Clients <bcp14>SHOULD</bcp14> check path support for QUIC independently by version</li>
          <li>Minor editorial changes</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-05">
        <name>since draft-ietf-quic-v2-05</name>
        <ul spacing="normal">
          <li>Servers <bcp14>MUST</bcp14> use the negotiated version in Initials with CRYPTO frames.</li>
          <li>Clarified when clients "learn" the negotiated version as required in the VN
draft.</li>
          <li>Comments from SECDIR review.</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-04">
        <name>since draft-ietf-quic-v2-04</name>
        <ul spacing="normal">
          <li>Clarified 0-RTT handling</li>
          <li>Editorial comments from Zahed Sarker.</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-03">
        <name>since draft-ietf-quic-v2-03</name>
        <ul spacing="normal">
          <li>a v2 session ticket is an indication of v2 support</li>
          <li>a v1-only extension is theoretically possible</li>
          <li>editorial fixes</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-02">
        <name>since draft-ietf-quic-v2-02</name>
        <ul spacing="normal">
          <li>Editorial comments from Lucas Pardue</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-01">
        <name>since draft-ietf-quic-v2-01</name>
        <ul spacing="normal">
          <li>Ban use of NEW_TOKEN tokens across versions</li>
          <li>version-info transport parameter required for all v2 endpoints</li>
          <li>Explicitly list known ALPN compatibility</li>
        </ul>
      </section>
      <section anchor="since-draft-ietf-quic-v2-00">
        <name>since draft-ietf-quic-v2-00</name>
        <ul spacing="normal">
          <li>Expanded requirements for compatible version negotiation</li>
          <li>Added test vectors</li>
          <li>Greased the packet type codepoints</li>
          <li>Random version number</li>
          <li>Clarified requirement to use QUIC-VN</li>
          <li>Banned use of resumption tokens across versions</li>
        </ul>
      </section>
      <section anchor="since-draft-duke-quic-v2-02">
        <name>since draft-duke-quic-v2-02</name>
        <ul spacing="normal">
          <li>Converted to adopted draft</li>
          <li>Deleted references to QUIC improvements</li>
          <li>Clarified status of QUIC extensions</li>
        </ul>
      </section>
      <section anchor="since-draft-duke-quic-v2-01">
        <name>since draft-duke-quic-v2-01</name>
        <ul spacing="normal">
          <li>Made the final version number TBD.</li>
          <li>Added ALPN considerations</li>
        </ul>
      </section>
      <section anchor="since-draft-duke-quic-v2-00">
        <name>since draft-duke-quic-v2-00</name>
        <ul spacing="normal">
          <li>Added provisional versions for interop</li>
          <li>Change the v1 Retry Tag secret</li>
          <li>Change labels to create full key separation</li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
