[core] I-D Action: draft-ietf-core-attacks-on-coap-04.txt
internet-drafts@ietf.org Thu, 22 February 2024 05:48 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BC3CC151548; Wed, 21 Feb 2024 21:48:40 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.5.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <170858092035.766.7097499864421065761@ietfa.amsl.com>
Date: Wed, 21 Feb 2024 21:48:40 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/14z95RSqt1NhFdaLkzhTvWCqY7I>
Subject: [core] I-D Action: draft-ietf-core-attacks-on-coap-04.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2024 05:48:40 -0000
Internet-Draft draft-ietf-core-attacks-on-coap-04.txt is now available. It is a work item of the Constrained RESTful Environments (CORE) WG of the IETF. Title: Attacks on the Constrained Application Protocol (CoAP) Authors: John Preuß Mattsson John Fornehed Göran Selander Francesca Palombini Christian Amsüss Name: draft-ietf-core-attacks-on-coap-04.txt Pages: 21 Dates: 2024-02-21 Abstract: Being able to securely retrieve information from sensors and control actuators while providing guards against distributed denial-of- service (DDoS) attacks are key requirements for CoAP deployments. To that aim, a security protocol (e.g., DTLS, TLS, or OSCORE) can be enabled to ensure secure CoAP operation, including protection against many attacks. This document identifies a set of known CoAP attacks and shows that simply using CoAP with a security protocol is not always enough for secure operation. Several of the identified attacks can be mitigated with a security protocol providing confidentiality and integrity combined with the solutions specified in RFC 9175. The IETF datatracker status page for this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-core-attacks-on-coap/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-ietf-core-attacks-on-coap-04.html A diff from the previous version is available at: https://author-tools.ietf.org/iddiff?url2=draft-ietf-core-attacks-on-coap-04 Internet-Drafts are also available by rsync at: rsync.ietf.org::internet-drafts
- [core] I-D Action: draft-ietf-core-attacks-on-coa… internet-drafts
- Re: [core] I-D Action: draft-ietf-core-attacks-on… John Mattsson