<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc compact="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-nottingham-rfc8615bis-02" category="std" consensus="true" obsoletes="8615" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <?v3xml2rfc table_borders="light"?>
  <front>
    <title abbrev="Well-Known URIs">Well-Known Uniform Resource Identifiers (URIs)</title>
    <seriesInfo name="Internet-Draft" value="draft-nottingham-rfc8615bis-02"/>
    <author initials="M." surname="Nottingham" fullname="Mark Nottingham">
      <organization/>
      <address>
        <email>mnot@mnot.net</email>
        <uri>https://www.mnot.net/</uri>
      </address>
    </author>
    <date/>
    <area>General</area>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 44?>

<t>This memo defines a path prefix for "well-known locations", <br/>
"/.well-known/", in selected Uniform Resource Identifier (URI) schemes.</t>
      <t>In doing so, it obsoletes RFC 8615.</t>
    </abstract>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some applications on the Web require the discovery of information about an origin <xref target="RFC6454"/> (sometimes called "site-wide metadata") before making a request. For example, the Robots Exclusion Protocol <xref target="RFC9309"/> specifies a way for automated processes to obtain permission to access resources; likewise, the Platform for Privacy Preferences <xref target="P3P"/> tells user agents how to discover privacy policy before interacting with an origin server.</t>
      <t>While there are several ways to access per-resource metadata (e.g., HTTP header fields, PROPFIND in Web Distributed Authoring and Versioning (WebDAV) <xref target="RFC4918"/>), the perceived overhead (either in terms of client-perceived latency and/or deployment difficulties) associated with them often precludes their use in these scenarios.</t>
      <t>At the same time, it has become more popular to use HTTP as a substrate for non-Web protocols. Sometimes, such protocols need a way to locate one or more resources on a given host.</t>
      <t>When this happens, one solution is to designate a "well-known location" for data or services related to the origin overall, so that it can be easily located. However, this approach has the drawback of risking collisions, both with other such designated "well-known locations" and with resources that the origin has created (or wishes to create). Furthermore, defining well-known locations usurps the origin's control over its own URI space <xref target="RFC7320"/>.</t>
      <t>To address these uses, this memo reserves a path prefix in nominated URI schemes for these "well-known locations", "/.well-known/". Future specifications that need to define a resource for such metadata can register their use to avoid collisions and minimise impingement upon origins' URI space.</t>
      <t>Well-known URIs can also be used with other URI schemes, but only when those schemes' definitions explicitly allow it.</t>
    </section>
    <section anchor="notational-conventions">
      <name>Notational Conventions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="well-known">
      <name>Well-Known URIs</name>
      <t>A well-known URI is a URI <xref target="RFC3986"/> whose path component begins with the characters "/.well-known/", provided that the scheme is explicitly defined to support well-known URIs.</t>
      <t>For example, if an application registers the name 'example', the corresponding well-known URI on 'http://www.example.com/' would be 'http://www.example.com/.well-known/example'.</t>
      <t>Previous revisions of this specification updated the "http" <xref target="RFC9110"/> and "https" <xref target="RFC9110"/> schemes to support well-known URIs. Other existing schemes can use the appropriate process for updating their definitions; for example, <xref target="RFC8307"/> does so for the "ws" and "wss" schemes. The "Uniform Resource Identifier (URI) Schemes" registry tracks which schemes support well-known URIs.</t>
      <t>Applications that wish to mint new well-known URIs MUST register them, following the procedures in <xref target="register"/>, subject to the following requirements.</t>
      <t>Registered names MUST conform to the "segment-nz" production in <xref target="RFC3986"/>. This means they cannot contain the "/" character.</t>
      <t>Registered names for a specific application SHOULD be correspondingly precise; "squatting" on generic terms is not encouraged. For example, if the Example application wants a well-known location for metadata, an appropriate registered name might be "example-metadata" or even "example.com-metadata", not "metadata".</t>
      <t>At a minimum, a registration will reference a specification that defines the format and associated media type(s) to be obtained by dereferencing the well-known URI, along with the URI scheme(s) that the well-known URI can be used with. If no URI schemes are explicitly specified, "http" and "https" are assumed.</t>
      <t>Typically, applications will use the default port for the given scheme; if an alternative port is used, it MUST be explicitly specified by the application in question.</t>
      <t>Registrations MAY also contain additional information, such as the syntax of additional path components, query strings, and/or fragment identifiers to be appended to the well-known URI, or protocol-specific details (e.g., HTTP <xref target="RFC9110"/> method handling).</t>
      <t>Note that this specification defines neither how to determine the hostname to use to find the well-known URI for a particular application, nor the scope of the metadata discovered by dereferencing the well-known URI; both should be defined by the application itself.</t>
      <t>Also, this specification does not define a format or media type for the resource located at "/.well-known/", and clients should not expect a resource to exist at that location.</t>
      <t>Well-known URIs are rooted in the top of the path's hierarchy; they are not well-known by definition in other parts of the path. For example, "/.well-known/example" is a well-known URI, whereas "/foo/.well-known/example" is not.</t>
      <t>See also <xref target="sec"/> for Security Considerations regarding well-known locations.</t>
      <section anchor="procedure">
        <name>Registering Well-Known URIs</name>
        <t>The "Well-Known URIs" registry is located at &lt;https://www.iana.org/assignments/well-known-uris/&gt;. Registration requests can be made by following the instructions located there or by sending an email to the &lt;wellknown-uri-review@ietf.org&gt; mailing list.</t>
        <t>Registration requests consist of at least the following information:</t>
        <dl>
          <dt>URI suffix:</dt>
          <dd>
            <t>The name requested for the well-known URI, relative to "/.well-known/"; e.g., "example". Syntactic requirements are described in <xref target="well-known"/>.</t>
          </dd>
          <dt>Change controller:</dt>
          <dd>
            <t>For Standards Track RFCs, state "IETF". For others, give the name of the responsible party. Other
details (e.g., email address, home page URI) may also be included.</t>
          </dd>
          <dt>Specification document(s):</dt>
          <dd>
            <t>Reference to the document that specifies the field, preferably including a URI that can be used
to retrieve a copy of the document. An indication of the relevant sections may also be included,
but is not required. Specification documents are expected to address the security considerations in <xref target="sec"/>.</t>
          </dd>
          <dt>Status:</dt>
          <dd>
            <t>One of "permanent", "provisional", "obsoleted", or "deprecated". See guidance below.</t>
          </dd>
          <dt>Related information:</dt>
          <dd>
            <t>Optionally, citations to additional documents containing further relevant information.</t>
          </dd>
        </dl>
        <t>Values defined by Standards Track RFCs and other open standards (in the sense of <xref target="RFC2026"/>, Section 7.1.1) can be registered with a status of "permanent".</t>
        <t>The change controller of a permanent registration MUST be the responsible party for the specification document(s). The change controller of a permanent registration can request that its status be changed to "obsoleted" or "deprecated" as circumstances require. If a change controller becomes defunct or cannot be contacted, the experts can change a registration's status as required, in consultation with the community.</t>
        <t>Values not defined by open standards processes can be registered with a status of "provisional".</t>
        <t>A request for provisional registration can be denied by the experts if they find that it uses a URI suffix that is overly generic or of potential community value in the future. For example, a provisional registration request for a commonly used term can be denied on the basis that it could preempt a future standards effort's use of the term, even if no such effort is yet in progress.</t>
        <t>Provisional entries can be promoted to "permanent" by the experts if -- in consultation with the community -- the experts find they are in broad use.</t>
        <t>Provisional entries can be removed by the experts if -- in consultation with the community -- the experts find that they are not in broad use one year or more after registration.</t>
        <t>Provisional entries can be removed by the experts at any time if the specification document(s) become unavailable, deprecated, obsoleted, or similar. In the case that a document becomes unavailable, the experts must attempt contact with the change controller to clarify its status first.</t>
        <t>Note that "consult the community" above refers to those responsible for the URI scheme(s) in question. Generally, this would take place on the mailing list(s) of the appropriate Working Group(s) (possibly concluded), or on &lt;art@ietf.org&gt; if no such list exists.</t>
        <t>The experts will keep public records of their decisions. Decisions by the experts can be appealed to the IESG.</t>
      </section>
    </section>
    <section anchor="sec">
      <name>Security Considerations</name>
      <t>Applications minting new well-known URIs, as well as administrators deploying them, will need to consider several security-related issues, including (but not limited to) exposure of sensitive data, denial-of-service attacks (in addition to normal load issues), server and client authentication, vulnerability to DNS rebinding attacks, and attacks where limited access to a server grants the ability to affect how well-known URIs are served.</t>
      <t><xref target="RFC3552"/> contains some examples of potential security considerations that may be relevant to application protocols and administrators deploying them.</t>
      <section anchor="protecting-well-known-resources">
        <name>Protecting Well-Known Resources</name>
        <t>Because well-known locations effectively represent the entire origin, server operators should appropriately control the ability to write to them. This is especially true when more than one entity is<br/>
co-located on the same origin. Even for origins that are controlled by and represent a single entity, due care should be taken to assure that write access to well-known locations is not granted unwittingly, either externally through server configuration or locally through implementation permissions (e.g., on a filesystem).</t>
      </section>
      <section anchor="interaction-with-web-browsing">
        <name>Interaction with Web Browsing</name>
        <t>Applications using well-known URIs for "http" or "https" URLs need to be aware that well-known resources will be accessible to Web browsers, and therefore are able to be manipulated by content obtained from other parts of that origin. If an attacker is able to inject content (e.g., through a Cross-Site Scripting vulnerability), they will be able to make potentially arbitrary requests to the well-known resource.</t>
        <t>HTTP and HTTPS also use origins as a security boundary for many other mechanisms, including (but not limited to) cookies <xref target="RFC6265"/>, Web Storage <xref target="WEBSTORAGE"/>, and various capabilities.</t>
        <t>An application that defines well-known locations should not assume that it has sole access to these mechanisms or that it is the only application using the origin. Depending on the nature of the application, mitigations can include:</t>
        <ul spacing="normal">
          <li>
            <t>Encrypting sensitive information</t>
          </li>
          <li>
            <t>Allowing flexibility in the use of identifiers (e.g., cookie names) to avoid collisions with other applications</t>
          </li>
          <li>
            <t>Using the 'HttpOnly' flag on cookies to assure that cookies are not exposed to browser scripting languages <xref target="RFC6265"/></t>
          </li>
          <li>
            <t>Using the 'Path' parameter on cookies to assure that they are not available to other parts of the origin <xref target="RFC6265"/></t>
          </li>
          <li>
            <t>Using X-Content-Type-Options: nosniff <xref target="FETCH"/> to assure that content under attacker control can't be coaxed into a form that is interpreted as active content by a Web browser</t>
          </li>
        </ul>
        <t>Other good practices include:</t>
        <ul spacing="normal">
          <li>
            <t>Using an application-specific media type in the Content-Type header field, and requiring clients to fail if it is not used</t>
          </li>
          <li>
            <t>Using Content-Security-Policy <xref target="CSP"/> to constrain the capabilities of active content (such as HTML <xref target="HTML5"/>), thereby mitigating Cross-Site Scripting attacks</t>
          </li>
          <li>
            <t>Using Referrer-Policy <xref target="REFERRER-POLICY"/> to prevent sensitive data in URLs from being leaked in the Referer request header field</t>
          </li>
          <li>
            <t>Avoiding use of compression on any sensitive information (e.g., authentication tokens, passwords), as the scripting environment offered by Web browsers allows an attacker to repeatedly probe the compression space; if the attacker has access to the path of the communication, they can use this capability to recover that information.</t>
          </li>
        </ul>
      </section>
      <section anchor="scoping-applications">
        <name>Scoping Applications</name>
        <t>This memo does not specify the scope of applicability for the information obtained from a well-known URI, and does not specify how to discover a well-known URI for a particular application.</t>
        <t>Individual applications using this mechanism must define both aspects; if this is not specified, security issues can arise from implementation deviations and confusion about boundaries between applications.</t>
        <t>Applying metadata discovered in a well-known URI to resources other than those co-located on the same origin risks administrative as well as security issues. For example, allowing "https://example.com/.well-known/example" to apply policy to "https://department.example.com", "https://www.example.com", or even "https://www.example.com:8000" assumes a relationship between hosts where there might be none, thereby giving control to a potential attacker.</t>
        <t>Likewise, specifying that a well-known URI on a particular hostname is to be used to bootstrap a protocol can cause a large number of undesired requests. For example, if a well-known HTTPS URI is used to find policy about a separate service such as email, it can result in a flood of requests to Web servers, even if they don't implement the well-known URI. Such undesired requests can resemble a denial-of-service attack.</t>
      </section>
      <section anchor="hidden-capabilities">
        <name>Hidden Capabilities</name>
        <t>Applications using well-known locations should consider that some server administrators might be unaware of their existence (especially on operating systems that hide directories whose names begin with "."). This means that if an attacker has write access to the <br/>
.well-known directory, they would be able to control its contents, possibly without the administrator realising it.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="register">
        <name>The Well-Known URI Registry</name>
        <t>This specification updates the registration procedures for the "Well-Known URI" registry, first defined in <xref target="RFC5785"/>.</t>
        <t>Well-known URIs are registered on the advice of one or more experts, with a Specification Required (using terminology from <xref target="RFC8126"/>).</t>
        <t>See <xref target="procedure"/> for the registration request procedure.</t>
        <t>IANA will direct the senders of any incoming registry requests to this document and, if defined, the processes established by the expert(s); typically, this will mean referring them to the registry Web page.</t>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC6454">
          <front>
            <title>The Web Origin Concept</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines the concept of an "origin", which is often used as the scope of authority or privilege by user agents. Typically, user agents isolate content retrieved from different origins to prevent malicious web site operators from interfering with the operation of benign web sites. In addition to outlining the principles that underlie the concept of origin, this document details how to determine the origin of a URI and how to serialize an origin into a string. It also defines an HTTP header field, named "Origin", that indicates which origins are associated with an HTTP request. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6454"/>
          <seriesInfo name="DOI" value="10.17487/RFC6454"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3986">
          <front>
            <title>Uniform Resource Identifier (URI): Generic Syntax</title>
            <author fullname="T. Berners-Lee" initials="T." surname="Berners-Lee"/>
            <author fullname="R. Fielding" initials="R." surname="Fielding"/>
            <author fullname="L. Masinter" initials="L." surname="Masinter"/>
            <date month="January" year="2005"/>
            <abstract>
              <t>A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="66"/>
          <seriesInfo name="RFC" value="3986"/>
          <seriesInfo name="DOI" value="10.17487/RFC3986"/>
        </reference>
        <reference anchor="RFC9110">
          <front>
            <title>HTTP Semantics</title>
            <author fullname="R. Fielding" initials="R." role="editor" surname="Fielding"/>
            <author fullname="M. Nottingham" initials="M." role="editor" surname="Nottingham"/>
            <author fullname="J. Reschke" initials="J." role="editor" surname="Reschke"/>
            <date month="June" year="2022"/>
            <abstract>
              <t>The Hypertext Transfer Protocol (HTTP) is a stateless application-level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and "https" Uniform Resource Identifier (URI) schemes.</t>
              <t>This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232, 7233, 7235, 7538, 7615, 7694, and portions of 7230.</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="97"/>
          <seriesInfo name="RFC" value="9110"/>
          <seriesInfo name="DOI" value="10.17487/RFC9110"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="HTML5" target="https://html.spec.whatwg.org">
          <front>
            <title>HTML - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="FETCH" target="https://fetch.spec.whatwg.org">
          <front>
            <title>Fetch - Living Standard</title>
            <author>
              <organization>WHATWG</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8323">
          <front>
            <title>CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <author fullname="S. Lemay" initials="S." surname="Lemay"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="B. Silverajan" initials="B." surname="Silverajan"/>
            <author fullname="B. Raymor" initials="B." role="editor" surname="Raymor"/>
            <date month="February" year="2018"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP. The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.</t>
              <t>Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS). This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports. It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8323"/>
          <seriesInfo name="DOI" value="10.17487/RFC8323"/>
        </reference>
        <reference anchor="RFC7252">
          <front>
            <title>The Constrained Application Protocol (CoAP)</title>
            <author fullname="Z. Shelby" initials="Z." surname="Shelby"/>
            <author fullname="K. Hartke" initials="K." surname="Hartke"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2014"/>
            <abstract>
              <t>The Constrained Application Protocol (CoAP) is a specialized web transfer protocol for use with constrained nodes and constrained (e.g., low-power, lossy) networks. The nodes often have 8-bit microcontrollers with small amounts of ROM and RAM, while constrained networks such as IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs) often have high packet error rates and a typical throughput of 10s of kbit/s. The protocol is designed for machine- to-machine (M2M) applications such as smart energy and building automation.</t>
              <t>CoAP provides a request/response interaction model between application endpoints, supports built-in discovery of services and resources, and includes key concepts of the Web such as URIs and Internet media types. CoAP is designed to easily interface with HTTP for integration with the Web while meeting specialized requirements such as multicast support, very low overhead, and simplicity for constrained environments.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7252"/>
          <seriesInfo name="DOI" value="10.17487/RFC7252"/>
        </reference>
        <reference anchor="RFC9309">
          <front>
            <title>Robots Exclusion Protocol</title>
            <author fullname="M. Koster" initials="M." surname="Koster"/>
            <author fullname="G. Illyes" initials="G." surname="Illyes"/>
            <author fullname="H. Zeller" initials="H." surname="Zeller"/>
            <author fullname="L. Sassman" initials="L." surname="Sassman"/>
            <date month="September" year="2022"/>
            <abstract>
              <t>This document specifies and extends the "Robots Exclusion Protocol" method originally defined by Martijn Koster in 1994 for service owners to control how content served by their services may be accessed, if at all, by automatic clients known as crawlers. Specifically, it adds definition language for the protocol, instructions for handling errors, and instructions for caching.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9309"/>
          <seriesInfo name="DOI" value="10.17487/RFC9309"/>
        </reference>
        <reference anchor="P3P" target="https://www.w3.org/TR/2002/REC-P3P-20020416/">
          <front>
            <title>The Platform for Privacy Preferences 1.0 (P3P1.0) Specification</title>
            <author fullname="Massimo Marchiori" role="editor"/>
            <date day="16" month="April" year="2002"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-P3P-20020416"/>
          <seriesInfo name="W3C" value="REC-P3P-20020416"/>
        </reference>
        <reference anchor="RFC4918">
          <front>
            <title>HTTP Extensions for Web Distributed Authoring and Versioning (WebDAV)</title>
            <author fullname="L. Dusseault" initials="L." role="editor" surname="Dusseault"/>
            <date month="June" year="2007"/>
            <abstract>
              <t>Web Distributed Authoring and Versioning (WebDAV) consists of a set of methods, headers, and content-types ancillary to HTTP/1.1 for the management of resource properties, creation and management of resource collections, URL namespace manipulation, and resource locking (collision avoidance).</t>
              <t>RFC 2518 was published in February 1999, and this specification obsoletes RFC 2518 with minor revisions mostly due to interoperability experience. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4918"/>
          <seriesInfo name="DOI" value="10.17487/RFC4918"/>
        </reference>
        <reference anchor="RFC7320">
          <front>
            <title>URI Design and Ownership</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>Section 1.1.1 of RFC 3986 defines URI syntax as "a federated and extensible naming system wherein each scheme's specification may further restrict the syntax and semantics of identifiers using that scheme." In other words, the structure of a URI is defined by its scheme. While it is common for schemes to further delegate their substructure to the URI's owner, publishing independent standards that mandate particular forms of URI substructure is inappropriate, because that essentially usurps ownership. This document further describes this problematic practice and provides some acceptable alternatives for use in standards.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7320"/>
          <seriesInfo name="DOI" value="10.17487/RFC7320"/>
        </reference>
        <reference anchor="RFC8307">
          <front>
            <title>Well-Known URIs for the WebSocket Protocol</title>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="January" year="2018"/>
            <abstract>
              <t>RFC 5785 defines a path prefix, "/.well-known/", that can be used by well-known URIs. It was specifically defined for the "http" and "https" URI schemes. The present memo formally updates RFC 6455, which defines the URI schemes defined for the WebSocket Protocol, to extend the use of these well-known URIs to those URI schemes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8307"/>
          <seriesInfo name="DOI" value="10.17487/RFC8307"/>
        </reference>
        <reference anchor="RFC2026">
          <front>
            <title>The Internet Standards Process -- Revision 3</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="October" year="1996"/>
            <abstract>
              <t>This memo documents the process used by the Internet community for the standardization of protocols and procedures. It defines the stages in the standardization process, the requirements for moving a document between stages and the types of documents used during this process. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="9"/>
          <seriesInfo name="RFC" value="2026"/>
          <seriesInfo name="DOI" value="10.17487/RFC2026"/>
        </reference>
        <reference anchor="RFC3552">
          <front>
            <title>Guidelines for Writing RFC Text on Security Considerations</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="B. Korver" initials="B." surname="Korver"/>
            <date month="July" year="2003"/>
            <abstract>
              <t>All RFCs are required to have a Security Considerations section. Historically, such sections have been relatively weak. This document provides guidelines to RFC authors on how to write a good Security Considerations section. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="72"/>
          <seriesInfo name="RFC" value="3552"/>
          <seriesInfo name="DOI" value="10.17487/RFC3552"/>
        </reference>
        <reference anchor="RFC6265">
          <front>
            <title>HTTP State Management Mechanism</title>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document defines the HTTP Cookie and Set-Cookie header fields. These header fields can be used by HTTP servers to store state (called cookies) at HTTP user agents, letting the servers maintain a stateful session over the mostly stateless HTTP protocol. Although cookies have many historical infelicities that degrade their security and privacy, the Cookie and Set-Cookie header fields are widely used on the Internet. This document obsoletes RFC 2965. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6265"/>
          <seriesInfo name="DOI" value="10.17487/RFC6265"/>
        </reference>
        <reference anchor="WEBSTORAGE" target="https://www.w3.org/TR/2016/REC-webstorage-20160419/">
          <front>
            <title>Web Storage (Second Edition)</title>
            <author fullname="Ian Hickson" role="editor"/>
            <date day="19" month="April" year="2016"/>
          </front>
          <seriesInfo name="W3C REC" value="REC-webstorage-20160419"/>
          <seriesInfo name="W3C" value="REC-webstorage-20160419"/>
        </reference>
        <reference anchor="CSP" target="https://www.w3.org/TR/2016/WD-CSP3-20160913/">
          <front>
            <title>Content Security Policy Level 3</title>
            <author/>
            <date day="13" month="September" year="2016"/>
          </front>
          <seriesInfo name="W3C WD" value="WD-CSP3-20160913"/>
          <seriesInfo name="W3C" value="WD-CSP3-20160913"/>
        </reference>
        <reference anchor="REFERRER-POLICY" target="https://www.w3.org/TR/2017/CR-referrer-policy-20170126/">
          <front>
            <title>Referrer Policy</title>
            <author fullname="Emily Stark" role="editor"/>
            <author fullname="Jochen Eisinger" role="editor"/>
            <date day="26" month="January" year="2017"/>
          </front>
          <seriesInfo name="W3C CR" value="CR-referrer-policy-20170126"/>
          <seriesInfo name="W3C" value="CR-referrer-policy-20170126"/>
        </reference>
        <reference anchor="RFC5785">
          <front>
            <title>Defining Well-Known Uniform Resource Identifiers (URIs)</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <author fullname="E. Hammer-Lahav" initials="E." surname="Hammer-Lahav"/>
            <date month="April" year="2010"/>
            <abstract>
              <t>This memo defines a path prefix for "well-known locations", "/.well-known/", in selected Uniform Resource Identifier (URI) schemes. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5785"/>
          <seriesInfo name="DOI" value="10.17487/RFC5785"/>
        </reference>
      </references>
    </references>
    <?line 208?>

<section anchor="frequently-asked-questions">
      <name>Frequently Asked Questions</name>
      <dl newline="true">
        <dt>Aren't well-known locations bad for the Web?</dt>
        <dd>
          <t>They are, but for various reasons -- both technical and social -- they are sometimes necessary. This memo defines a "sandbox" for them, to reduce the risks of collision and to minimise the impact upon preexisting URIs on sites.</t>
        </dd>
        <dt>Why "/.well-known?"</dt>
        <dd>
          <t>It's short, descriptive, and according to search indices, not widely used.</t>
        </dd>
        <dt>What impact does this have on existing mechanisms, such as P3P and robots.txt?</dt>
        <dd>
          <t>None, until they choose to use this mechanism.</t>
        </dd>
        <dt>Why aren't per-directory well-known locations defined?</dt>
        <dd>
          <t>Allowing every URI path segment to have a well-known location (e.g., "/images/.well-known/") would increase the risks of colliding with a preexisting URI on a site, and generally these solutions are found not to scale well because they're too "chatty".</t>
        </dd>
      </dl>
    </section>
    <section anchor="changes-from-rfc-8615">
      <name>Changes from RFC 8615</name>
      <ul spacing="normal">
        <li>
          <t>Updated registration guidelines</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
