[core] I-D Action: draft-ietf-core-attacks-on-coap-04.txt

internet-drafts@ietf.org Thu, 22 February 2024 05:48 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5BC3CC151548; Wed, 21 Feb 2024 21:48:40 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.5.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <170858092035.766.7097499864421065761@ietfa.amsl.com>
Date: Wed, 21 Feb 2024 21:48:40 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/14z95RSqt1NhFdaLkzhTvWCqY7I>
Subject: [core] I-D Action: draft-ietf-core-attacks-on-coap-04.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2024 05:48:40 -0000

Internet-Draft draft-ietf-core-attacks-on-coap-04.txt is now available. It is
a work item of the Constrained RESTful Environments (CORE) WG of the IETF.

   Title:   Attacks on the Constrained Application Protocol (CoAP)
   Authors: John Preuß Mattsson
            John Fornehed
            Göran Selander
            Francesca Palombini
            Christian Amsüss
   Name:    draft-ietf-core-attacks-on-coap-04.txt
   Pages:   21
   Dates:   2024-02-21


   Being able to securely retrieve information from sensors and control
   actuators while providing guards against distributed denial-of-
   service (DDoS) attacks are key requirements for CoAP deployments.  To
   that aim, a security protocol (e.g., DTLS, TLS, or OSCORE) can be
   enabled to ensure secure CoAP operation, including protection against
   many attacks.  This document identifies a set of known CoAP attacks
   and shows that simply using CoAP with a security protocol is not
   always enough for secure operation.  Several of the identified
   attacks can be mitigated with a security protocol providing
   confidentiality and integrity combined with the solutions specified
   in RFC 9175.

The IETF datatracker status page for this Internet-Draft is:

There is also an HTML version available at:

A diff from the previous version is available at:

Internet-Drafts are also available by rsync at: