You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-romann-mud-constrained.md
+5-8Lines changed: 5 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,7 +78,7 @@ authenticity of both the URL itself and the associated MUD file.
78
78
This specification re-uses the terminology defined in {{!RFC8520}}.
79
79
<!-- Additionally, it introduces following terms: TODO -->
80
80
81
-
## Architecture
81
+
# Architecture
82
82
83
83
Building upon the MUD architecture specified in {{!RFC8520}}, there are two
84
84
main network components relevant for this document:
@@ -99,8 +99,8 @@ constrained environment can be seen in {{arch1-fig}}.
99
99
Here, we can see that both the Thing and the MUD Receiver (as the recipient of
100
100
the MUD URLs) may initiate the MUD discovery process:
101
101
The Thing can contact and register with MUD URL recipients, e.g. by sending a
102
-
CoAP POST request via Multicast or addressing a well-known registration endpoint.
103
-
Conversely, MUD recipients can initiate the discovery process, e.g. by sending a
102
+
CoAP POST request via Multicast and/or addressing a well-known registration endpoint.
103
+
Conversely, a MUD Receiver can initiate the discovery process, e.g. by sending a
104
104
COAP GET request to a well-known URI via multicast.
105
105
106
106
Note that the protocol used for communication between the MUD Receiver and
@@ -165,9 +165,7 @@ Alternatively, MUD URLs can also be referenced through other self description fo
165
165
such as SUIT manifests {{!I-D.ietf-suit-mud}}.
166
166
Including MUD URLs with other self descriptions can be advantageous with regard to the
167
167
availability of said information (e.g., by making the MUD URL available through a central directory).
168
-
<!-- TODO the last line seems a bit clumsy in its wording -->
169
-
It may also ease the validation of the MUD URL's authenticity in cases where the other self description format
170
-
or its method of distribution provides means for authentication.
168
+
If the other self description format or its method of distribution provides means for authentication, they may also be used for validating MUD URLs.
171
169
172
170
In this specification, we will describe how to embed a MUD URL into a CoRE Link
173
171
Format {{!RFC6690}} resource, which may itself be retrieved directly from the device or through
@@ -305,8 +303,7 @@ By using CoRE Resource Directories {{?RFC9176}}, devices can register a MUD file
305
303
A MUD manager itself MAY also act as a Resource Directory, directly applying the policies from registered MUD files to the network.
306
304
In addition to the registration endpoint defined in {{?RFC9176}}, MUD managers MAY define a separate registration interface when acting as a CoRE RD.
307
305
308
-
# Obtaining a MUD URL in Constrained Environments
309
-
<!-- TODO: Maybe rename this section and make it specific to the dedicated CoAP resource, and then have a separate top-level section for the embedding into the CoRE Link Format -->
306
+
# Obtaining a MUD URL via dedicated CoAP Resources
310
307
311
308
With the additional mechanisms for finding MUD URLs introduced in this document, MUD managers can be configured to play a more active role in discovering MUD-enabled devices.
312
309
Furthermore, IoT devices could identify their peers based on a MUD URL associated with these devices or perform a configuration process based on the linked MUD file's contents.
0 commit comments