[core] I-D Action: draft-ietf-core-attacks-on-coap-00.txt
internet-drafts@ietf.org Mon, 09 May 2022 12:40 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C3A76C15E6C4; Mon, 9 May 2022 05:40:24 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 8.1.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <165210002477.57018.12734354580649011810@ietfa.amsl.com>
Date: Mon, 09 May 2022 05:40:24 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/LFQhTybcL9VR8mFkbOLM7Mfga5I>
Subject: [core] I-D Action: draft-ietf-core-attacks-on-coap-00.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.34
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 09 May 2022 12:40:24 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Constrained RESTful Environments WG of the IETF. Title : Attacks on the Constrained Application Protocol (CoAP) Authors : John Preuß Mattsson John Fornehed Göran Selander Francesca Palombini Christian Amsüss Filename : draft-ietf-core-attacks-on-coap-00.txt Pages : 19 Date : 2022-05-09 Abstract: Being able to securely read information from sensors, to securely control actuators, and to not enable distributed denial-of-service attacks are essential in a world of connected and networking things interacting with the physical world. This document summarizes a number of known attacks on CoAP and show that just using CoAP with a security protocol like DTLS, TLS, or OSCORE is not enough for secure operation. Several of the discussed attacks can be mitigated with the solutions in draft-ietf-core-echo-request-tag. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-core-attacks-on-coap/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-ietf-core-attacks-on-coap-00.html Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
- [core] I-D Action: draft-ietf-core-attacks-on-coa… internet-drafts