You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-romann-mud-constrained.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -190,6 +190,7 @@ Conversely, in environments where multicast is not an issue and things might be
190
190
In this specification, this will be referred to as the "Receiver-initiated" submission flow.
191
191
192
192
### Using the MUD-URL Resource (Receiver-initiated)
193
+
193
194
In the Receiver-initiated flow, Things provide a CoAP resource discoverable by the means provided in {{general_discovery}}, which is then requested by MUD receivers to retrieve the MUD-URL.
194
195
195
196
<!-- TODO ascii-drawing of this resource -->
@@ -212,6 +213,7 @@ In general, the Receiver-initiated MUD-URL flow can be divided into these steps:
212
213
<!-- TODO advantages/disadvantages? -->
213
214
214
215
### Using the MUD-URL Submission Resource (Thing-initiated)
216
+
215
217
In the Thing-initiated flow, Things discovery a submission resource provided by the MUD Receiver and submit their MUD-URLs to this resource.
216
218
217
219
This flow can be divided into these general steps:
@@ -265,7 +267,9 @@ To do so, the following procedures SHOULD be used.
265
267
Both of the following procedures use the establishment of a DTLS session using the PoP key in order to prove the possession of the key, similarly to the procedures defined in {{!RFC9202}}.
266
268
267
269
<!-- TODO required ciphers? -->
270
+
268
271
### For the Thing-initiated Flow
272
+
269
273
1. After submitting the MUD-URL, the MUD Receiver parses the token.
270
274
If it detects Proof-of-Possession claims, the receiver MUST reply with a 4.01 (Unauthorized) CoAP response code and reject the token for now.
271
275
If the original submission request was not performed using CoAPS, the Receiver MUST also return a set of key information that can be used to establish a CoAP+DTLS session with it, as well as a CoAPS URI indicating the location of the secured submission resource.
0 commit comments