[Dots] FW: [core] RFC 8323 on CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets

"Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com> Thu, 15 February 2018 05:18 UTC

Return-Path: <TirumaleswarReddy_Konda@mcafee.com>
X-Original-To: dots@ietfa.amsl.com
Delivered-To: dots@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62A2912D881 for <dots@ietfa.amsl.com>; Wed, 14 Feb 2018 21:18:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.01
X-Spam-Level:
X-Spam-Status: No, score=-7.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mcafee.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FoJ1-u4v4J-V for <dots@ietfa.amsl.com>; Wed, 14 Feb 2018 21:18:13 -0800 (PST)
Received: from MIVWSMAILOUT1.mcafee.com (mivwsmailout1.mcafee.com [161.69.47.167]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F41212D86E for <dots@ietf.org>; Wed, 14 Feb 2018 21:18:13 -0800 (PST)
X-NAI-Header: Modified by McAfee Email Gateway (5500)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mcafee.com; s=s_mcafee; t=1518671892; h=From: To:Subject:Thread-Topic:Thread-Index:Date: Message-ID:References:In-Reply-To:Accept-Language: Content-Language:X-MS-Has-Attach:X-MS-TNEF-Correlator: dlp-product:dlp-version:dlp-reaction:authentication-results: x-originating-ip:x-ms-publictraffictype:x-microsoft-exchange-diagnostics: x-ms-exchange-antispam-srfa-diagnostics:x-ms-office365-filtering-correlation-id: x-microsoft-antispam:x-ms-traffictypediagnostic: x-microsoft-antispam-prvs:x-exchange-antispam-report-test: x-exchange-antispam-report-cfa-test:x-forefront-prvs: x-forefront-antispam-report:received-spf:x-microsoft-antispam-message-info: spamdiagnosticoutput:spamdiagnosticmetadata: Content-Type:Content-Transfer-Encoding:MIME-Version: X-MS-Exchange-CrossTenant-Network-Message-Id: X-MS-Exchange-CrossTenant-originalarrivaltime: X-MS-Exchange-CrossTenant-fromentityheader: X-MS-Exchange-CrossTenant-id:X-MS-Exchange-Transport-CrossTenantHeadersStamped: X-OriginatorOrg:X-NAI-Spam-Flag:X-NAI-Spam-Threshold: X-NAI-Spam-Score:X-NAI-Spam-Version; bh=g DpnUxsGG4ee8Xoy1i+FkUl80E84hS6JZXYePL76eg M=; b=TFWibvcBfTiBMr3lJ1U+iYjWYaSMAzLBBYcJIiW9/bnn McYduN9PgBJr6nDjM/nu85NpE6r+TFenJPVLwh/YFyEGcttk4c 0P4goJ0Y57nbew5e6WqOez7+uN8uKbBBuhv+ue0XjO7UbOtK/l +oJFnkRK0TbCV90b8OmN9daNoG8=
Received: from MIVEXAPP1N03.corpzone.internalzone.com (unknown [10.48.48.90]) by MIVWSMAILOUT1.mcafee.com with smtp (TLS: TLSv1/SSLv3,256bits,ECDHE-RSA-AES256-SHA384) id 5799_0259_843df8d0_5124_4e06_aef2_fc2d4499c818; Wed, 14 Feb 2018 23:18:10 -0600
Received: from MIVEXUSR1N03.corpzone.internalzone.com (10.48.48.83) by MIVEXAPP1N03.corpzone.internalzone.com (10.48.48.90) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Thu, 15 Feb 2018 00:18:10 -0500
Received: from MIVO365EDGE4.corpzone.internalzone.com (10.48.176.87) by MIVEXUSR1N03.corpzone.internalzone.com (10.48.48.83) with Microsoft SMTP Server (TLS) id 15.0.1347.2 via Frontend Transport; Thu, 15 Feb 2018 00:18:10 -0500
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (10.48.176.243) by edge.mcafee.com (10.48.176.87) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Thu, 15 Feb 2018 00:18:09 -0500
Received: from DM5PR16MB1788.namprd16.prod.outlook.com (10.172.44.144) by DM5PR16MB1515.namprd16.prod.outlook.com (10.173.212.9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.506.18; Thu, 15 Feb 2018 05:18:09 +0000
Received: from DM5PR16MB1788.namprd16.prod.outlook.com ([10.172.44.144]) by DM5PR16MB1788.namprd16.prod.outlook.com ([10.172.44.144]) with mapi id 15.20.0485.015; Thu, 15 Feb 2018 05:18:09 +0000
From: "Konda, Tirumaleswar Reddy" <TirumaleswarReddy_Konda@McAfee.com>
To: dots <dots@ietf.org>
Thread-Topic: [core] RFC 8323 on CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets
Thread-Index: AQHTpf3Ni9jchEyqkkOfvtXhg0de9aOk7JTQ
Date: Thu, 15 Feb 2018 05:18:08 +0000
Message-ID: <DM5PR16MB178801E5C29485E5E60A4274EAF40@DM5PR16MB1788.namprd16.prod.outlook.com>
References: <20180215013518.3E44EB8129C@rfc-editor.org>
In-Reply-To: <20180215013518.3E44EB8129C@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
dlp-product: dlpe-windows
dlp-version: 11.0.200.100
dlp-reaction: no-action
authentication-results: spf=none (sender IP is ) smtp.mailfrom=TirumaleswarReddy_Konda@McAfee.com;
x-originating-ip: [103.245.47.20]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR16MB1515; 7:EdTEZFY44/thu9UlkuwUBnw24j8rNnpXL0m/eZmYzkJJ7++0wpbgOX2wR6zZ8jEh27DaUFWCj7m/po2vdJXEh7VlD9OZr9THotLJDqTWf4Q00PMjW0OBeqjIQQW7fWXmuBKLbnLO20/FXqBMcNMoIi866aZBU5GN8X0zyaXHSZ9pP82NVbi24kOMpuxF1Pbf3x9cVi3vN3CNN3z9McGzNB7CSBiwD2HYfuEAXfcJ+QRucVSJ6O/ezvyTSS2XRIDd
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: e386db08-cc01-4cc8-2cd9-08d574338078
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:DM5PR16MB1515;
x-ms-traffictypediagnostic: DM5PR16MB1515:
x-microsoft-antispam-prvs: <DM5PR16MB1515ECDD9A0FDCFF2B8B2674EAF40@DM5PR16MB1515.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(209352067349851)(192374486261705)(248736688235697)(212694052984031)(194151415913766);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(3231101)(944501161)(3002001)(93006095)(93001095)(10201501046)(6041288)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123558120)(20161123564045)(6072148)(201708071742011); SRVR:DM5PR16MB1515; BCL:0; PCL:0; RULEID:; SRVR:DM5PR16MB1515;
x-forefront-prvs: 058441C12A
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(396003)(39860400002)(39380400002)(346002)(189003)(199004)(32952001)(13464003)(305945005)(74316002)(45080400002)(14454004)(77096007)(186003)(53936002)(478600001)(33656002)(26005)(3280700002)(80792005)(86362001)(72206003)(966005)(9686003)(229853002)(97736004)(6306002)(6436002)(2473003)(3846002)(53546011)(102836004)(6506007)(59450400001)(25786009)(55016002)(7736002)(6116002)(2950100002)(6916009)(2906002)(99286004)(2900100001)(81166006)(8676002)(81156014)(7696005)(66066001)(8936002)(76176011)(105586002)(316002)(106356001)(5660300001)(3660700001)(68736007)(85282002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR16MB1515; H:DM5PR16MB1788.namprd16.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en;
received-spf: None (protection.outlook.com: McAfee.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 5F895DM8jcXyccYpmA6JhDcj+K5NazgMiJ+iUe3FJBCPJy4PIo54pLPpOj+c7Iwoo6q7t6YM5MfCbYXBeTcIJQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: e386db08-cc01-4cc8-2cd9-08d574338078
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Feb 2018 05:18:08.9055 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 4943e38c-6dd4-428c-886d-24932bc2d5de
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR16MB1515
X-OriginatorOrg: mcafee.com
X-NAI-Spam-Flag: NO
X-NAI-Spam-Threshold: 15
X-NAI-Spam-Score: 0
X-NAI-Spam-Version: 2.3.0.9418 : core <6222> : inlines <6398> : streams <1779020> : uri <2593103>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dots/O7Hnw5bRpghNenx8Yvj5_1l4RBQ>
Subject: [Dots] FW: [core] RFC 8323 on CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets
X-BeenThere: dots@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "List for discussion of DDoS Open Threat Signaling \(DOTS\) technology and directions." <dots.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dots>, <mailto:dots-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dots/>
List-Post: <mailto:dots@ietf.org>
List-Help: <mailto:dots-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dots>, <mailto:dots-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Feb 2018 05:18:15 -0000

-----Original Message-----
From: core [mailto:core-bounces@ietf.org] On Behalf Of rfc-editor@rfc-editor.org
Sent: Thursday, February 15, 2018 7:05 AM
To: ietf-announce@ietf.org; rfc-dist@rfc-editor.org
Cc: drafts-update-ref@iana.org; core@ietf.org; rfc-editor@rfc-editor.org
Subject: [core] RFC 8323 on CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets

A new Request for Comments is now available in online RFC libraries.

        
        RFC 8323

        Title:      CoAP (Constrained Application Protocol) over 
                    TCP, TLS, and WebSockets 
        Author:     C. Bormann, 
                    S. Lemay,
                    H. Tschofenig,
                    K. Hartke,
                    B. Silverajan,
                    B. Raymor, Ed.
        Status:     Standards Track
        Stream:     IETF
        Date:       February 2018
        Mailbox:    cabo@tzi.org, 
                    slemay@zebra.com, 
                    Hannes.Tschofenig@gmx.net,
                    hartke@tzi.org, 
                    Bilhanan.Silverajan@tut.fi,
                    brianraymor@hotmail.com
        Pages:      54
        Characters: 110771
        Updates:    RFC 7641, RFC 7959

        I-D Tag:    draft-ietf-core-coap-tcp-tls-11.txt

        URL:        https://www.rfc-editor.org/info/rfc8323

        DOI:        10.17487/RFC8323

The Constrained Application Protocol (CoAP), although inspired by HTTP, was designed to use UDP instead of TCP.  The message layer of CoAP over UDP includes support for reliable delivery, simple congestion control, and flow control.

Some environments benefit from the availability of CoAP carried over reliable transports such as TCP or Transport Layer Security (TLS).
This document outlines the changes required to use CoAP over TCP, TLS, and WebSockets transports.  It also formally updates RFC 7641 for use with these transports and RFC 7959 to enable the use of larger messages over a reliable transport.

This document is a product of the Constrained RESTful Environments Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track protocol for the Internet community, and requests discussion and suggestions for improvements.  Please refer to the current edition of the Official Internet Protocol Standards (https://www.rfc-editor.org/standards) for the standardization state and status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless specifically noted otherwise on the RFC itself, all RFCs are for unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


_______________________________________________
core mailing list
core@ietf.org
https://www.ietf.org/mailman/listinfo/core