| < draft-ietf-tls-dtls-rrc-03.txt | draft-ietf-tls-dtls-rrc-04.txt > | |||
|---|---|---|---|---|
| TLS H. Tschofenig, Ed. | TLS H. Tschofenig, Ed. | |||
| Internet-Draft T. Fossati, Ed. | Internet-Draft T. Fossati, Ed. | |||
| Updates: 6347 (if approved) Arm Limited | Updates: 6347 (if approved) Arm Limited | |||
| Intended status: Standards Track December 21, 2021 | Intended status: Standards Track December 21, 2021 | |||
| Expires: June 24, 2022 | Expires: June 24, 2022 | |||
| Return Routability Check for DTLS 1.2 and DTLS 1.3 | Return Routability Check for DTLS 1.2 and DTLS 1.3 | |||
| draft-ietf-tls-dtls-rrc-03 | draft-ietf-tls-dtls-rrc-04 | |||
| Abstract | Abstract | |||
| This document specifies a return routability check for use in context | This document specifies a return routability check for use in context | |||
| of the Connection ID (CID) construct for the Datagram Transport Layer | of the Connection ID (CID) construct for the Datagram Transport Layer | |||
| Security (DTLS) protocol versions 1.2 and 1.3. | Security (DTLS) protocol versions 1.2 and 1.3. | |||
| Status of This Memo | Status of This Memo | |||
| This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
| skipping to change at page 2, line 36 ¶ | skipping to change at page 2, line 36 ¶ | |||
| 5.3. Timer Choice . . . . . . . . . . . . . . . . . . . . . . 6 | 5.3. Timer Choice . . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 6. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | 6. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 | |||
| 7. Security and Privacy Considerations . . . . . . . . . . . . . 10 | 7. Security and Privacy Considerations . . . . . . . . . . . . . 10 | |||
| 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 9. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 9. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 | 10. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 10 | 11. References . . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
| 11.1. Normative References . . . . . . . . . . . . . . . . . . 10 | 11.1. Normative References . . . . . . . . . . . . . . . . . . 10 | |||
| 11.2. Informative References . . . . . . . . . . . . . . . . . 11 | 11.2. Informative References . . . . . . . . . . . . . . . . . 11 | |||
| Appendix A. History . . . . . . . . . . . . . . . . . . . . . . 12 | Appendix A. History . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 12 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 13 | |||
| 1. Introduction | 1. Introduction | |||
| In "classical" DTLS, selecting a security context of an incoming DTLS | In "classical" DTLS, selecting a security context of an incoming DTLS | |||
| record is accomplished with the help of the 5-tuple, i.e. source IP | record is accomplished with the help of the 5-tuple, i.e. source IP | |||
| address, source port, transport protocol, destination IP address, and | address, source port, transport protocol, destination IP address, and | |||
| destination port. Changes to this 5 tuple can happen for a variety | destination port. Changes to this 5 tuple can happen for a variety | |||
| reasons over the lifetime of the DTLS session. In the IoT context, | reasons over the lifetime of the DTLS session. In the IoT context, | |||
| NAT rebinding is common with sleepy devices. Other examples include | NAT rebinding is common with sleepy devices. Other examples include | |||
| end host mobility and multi-homing. Without CID, if the source IP | end host mobility and multi-homing. Without CID, if the source IP | |||
| skipping to change at page 12, line 9 ¶ | skipping to change at page 12, line 9 ¶ | |||
| [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | |||
| Multiplexed and Secure Transport", RFC 9000, | Multiplexed and Secure Transport", RFC 9000, | |||
| DOI 10.17487/RFC9000, May 2021, | DOI 10.17487/RFC9000, May 2021, | |||
| <https://www.rfc-editor.org/info/rfc9000>. | <https://www.rfc-editor.org/info/rfc9000>. | |||
| Appendix A. History | Appendix A. History | |||
| [[CREF1: RFC EDITOR: PLEASE REMOVE THIS SECTION]] | [[CREF1: RFC EDITOR: PLEASE REMOVE THIS SECTION]] | |||
| draft-ietf-tls-dtls-rrc-04 | ||||
| - Re-submitted draft to fix references | ||||
| draft-ietf-tls-dtls-rrc-03 | ||||
| - Added details for challenge-response exchange | ||||
| draft-ietf-tls-dtls-rrc-02 | draft-ietf-tls-dtls-rrc-02 | |||
| - Undo the TLS flags extension for negotiating RRC, use a new | - Undo the TLS flags extension for negotiating RRC, use a new | |||
| extension type | extension type | |||
| draft-ietf-tls-dtls-rrc-01 | draft-ietf-tls-dtls-rrc-01 | |||
| - Use the TLS flags extension for negotiating RRC | - Use the TLS flags extension for negotiating RRC | |||
| - Enhanced IANA consideration section | - Enhanced IANA consideration section | |||
| End of changes. 3 change blocks. | ||||
| 2 lines changed or deleted | 10 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||