[core] I-D Action: draft-ietf-core-attacks-on-coap-03.txt

internet-drafts@ietf.org Sun, 11 June 2023 18:51 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id E7645C14CE51; Sun, 11 Jun 2023 11:51:10 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 11.0.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <168650947092.62266.18419070105597824117@ietfa.amsl.com>
Date: Sun, 11 Jun 2023 11:51:10 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/rWi8atfUACi5lEWebZsV2g2vlyU>
Subject: [core] I-D Action: draft-ietf-core-attacks-on-coap-03.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Jun 2023 18:51:11 -0000

A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Constrained RESTful
Environments (CORE) WG of the IETF.

   Title           : Attacks on the Constrained Application Protocol (CoAP)
   Authors         : John Preuß Mattsson
                     John Fornehed
                     Göran Selander
                     Francesca Palombini
                     Christian Amsüss
   Filename        : draft-ietf-core-attacks-on-coap-03.txt
   Pages           : 21
   Date            : 2023-06-11

Abstract:
   Being able to securely read information from sensors, to securely
   control actuators, and to not enable distributed denial-of-service
   attacks are essential in a world of connected and networking things
   interacting with the physical world.  Using a security protocol such
   as DTLS, TLS, or OSCORE to protect CoAP is a requirement for secure
   operation and protects against many attacks.  This document
   summarizes a number of known attacks on CoAP deployments and show
   that just using CoAP with a security protocol like DTLS, TLS, or
   OSCORE is not always enough for secure operation.  Several of the
   discussed attacks can be mitigated with a security protocol such as
   DTLS, TLS, or OSCORE providing confidentiality and integrity combined
   with the solutions in RFC 9175.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-attacks-on-coap/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-attacks-on-coap-03.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-core-attacks-on-coap-03

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts