I-D Action: draft-mattsson-core-coap-attacks-03.txt
internet-drafts@ietf.org Fri, 04 February 2022 14:49 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: i-d-announce@ietf.org
Delivered-To: i-d-announce@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C9D9C3A14D2 for <i-d-announce@ietf.org>; Fri, 4 Feb 2022 06:49:35 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Subject: I-D Action: draft-mattsson-core-coap-attacks-03.txt
X-Test-IDTracker: no
X-IETF-IDTracker: 7.44.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <164398617574.31288.15053173482656037084@ietfa.amsl.com>
Date: Fri, 04 Feb 2022 06:49:35 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/i-d-announce/afOPiHuPNtAEn_3xRxFEPLafHw8>
X-BeenThere: i-d-announce@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Internet Draft Announcements only <i-d-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/i-d-announce/>
List-Post: <mailto:i-d-announce@ietf.org>
List-Help: <mailto:i-d-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/i-d-announce>, <mailto:i-d-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 04 Feb 2022 14:49:36 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. Title : Attacks on the Constrained Application Protocol (CoAP) Authors : John Preuß Mattsson John Fornehed Göran Selander Francesca Palombini Christian Amsüss Filename : draft-mattsson-core-coap-attacks-03.txt Pages : 20 Date : 2022-02-04 Abstract: Being able to securely read information from sensors, to securely control actuators, and to not enable distributed denial-of-service attacks are essential in a world of connected and networking things interacting with the physical world. This document summarizes a number of known attacks on CoAP and show that just using CoAP with a security protocol like DTLS, TLS, or OSCORE is not enough for secure operation. Several of the discussed attacks can be mitigated with the solutions in draft-ietf-core-echo-request-tag. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-mattsson-core-coap-attacks/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-mattsson-core-coap-attacks-03.html A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-mattsson-core-coap-attacks-03 Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
- I-D Action: draft-mattsson-core-coap-attacks-03.t… internet-drafts