Skip to content

Commit 82d5c4c

Browse files
pulsastrixJKRhb
andcommitted
Address review comments in #18
Co-Authored-By: Jan Romann <[email protected]>
1 parent a7e1dd4 commit 82d5c4c

File tree

1 file changed

+5
-8
lines changed

1 file changed

+5
-8
lines changed

draft-romann-mud-constrained.md

Lines changed: 5 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ authenticity of both the URL itself and the associated MUD file.
7878
This specification re-uses the terminology defined in {{!RFC8520}}.
7979
<!-- Additionally, it introduces following terms: TODO -->
8080

81-
## Architecture
81+
# Architecture
8282

8383
Building upon the MUD architecture specified in {{!RFC8520}}, there are two
8484
main network components relevant for this document:
@@ -99,8 +99,8 @@ constrained environment can be seen in {{arch1-fig}}.
9999
Here, we can see that both the Thing and the MUD Receiver (as the recipient of
100100
the MUD URLs) may initiate the MUD discovery process:
101101
The Thing can contact and register with MUD URL recipients, e.g. by sending a
102-
CoAP POST request via Multicast or addressing a well-known registration endpoint.
103-
Conversely, MUD recipients can initiate the discovery process, e.g. by sending a
102+
CoAP POST request via Multicast and/or addressing a well-known registration endpoint.
103+
Conversely, a MUD Receiver can initiate the discovery process, e.g. by sending a
104104
COAP GET request to a well-known URI via multicast.
105105

106106
Note that the protocol used for communication between the MUD Receiver and
@@ -165,9 +165,7 @@ Alternatively, MUD URLs can also be referenced through other self description fo
165165
such as SUIT manifests {{!I-D.ietf-suit-mud}}.
166166
Including MUD URLs with other self descriptions can be advantageous with regard to the
167167
availability of said information (e.g., by making the MUD URL available through a central directory).
168-
<!-- TODO the last line seems a bit clumsy in its wording -->
169-
It may also ease the validation of the MUD URL's authenticity in cases where the other self description format
170-
or its method of distribution provides means for authentication.
168+
If the other self description format or its method of distribution provides means for authentication, they may also be used for validating MUD URLs.
171169

172170
In this specification, we will describe how to embed a MUD URL into a CoRE Link
173171
Format {{!RFC6690}} resource, which may itself be retrieved directly from the device or through
@@ -305,8 +303,7 @@ By using CoRE Resource Directories {{?RFC9176}}, devices can register a MUD file
305303
A MUD manager itself MAY also act as a Resource Directory, directly applying the policies from registered MUD files to the network.
306304
In addition to the registration endpoint defined in {{?RFC9176}}, MUD managers MAY define a separate registration interface when acting as a CoRE RD.
307305

308-
# Obtaining a MUD URL in Constrained Environments
309-
<!-- TODO: Maybe rename this section and make it specific to the dedicated CoAP resource, and then have a separate top-level section for the embedding into the CoRE Link Format -->
306+
# Obtaining a MUD URL via dedicated CoAP Resources
310307

311308
With the additional mechanisms for finding MUD URLs introduced in this document, MUD managers can be configured to play a more active role in discovering MUD-enabled devices.
312309
Furthermore, IoT devices could identify their peers based on a MUD URL associated with these devices or perform a configuration process based on the linked MUD file's contents.

0 commit comments

Comments
 (0)