Skip to main content

Amplification Attacks Using the Constrained Application Protocol (CoAP)
draft-irtf-t2trg-amplification-attacks-03

Revision differences

Document history

Date Rev. By Action
2024-08-24
03 (System) Document has expired
2024-02-21
03 John Preuß Mattsson New version available: draft-irtf-t2trg-amplification-attacks-03.txt
2024-02-21
03 John Preuß Mattsson New version accepted (logged-in submitter: John Preuß Mattsson)
2024-02-21
03 John Preuß Mattsson Uploaded new revision
2023-10-14
02 (System) Document has expired
2023-04-12
02 John Preuß Mattsson New version available: draft-irtf-t2trg-amplification-attacks-02.txt
2023-04-12
02 John Preuß Mattsson New version accepted (logged-in submitter: John Preuß Mattsson)
2023-04-12
02 John Preuß Mattsson Uploaded new revision
2023-01-17
01 John Preuß Mattsson New version available: draft-irtf-t2trg-amplification-attacks-01.txt
2023-01-17
01 John Preuß Mattsson New version accepted (logged-in submitter: John Preuß Mattsson)
2023-01-17
01 John Preuß Mattsson Uploaded new revision
2023-01-12
00 Ari Keränen This document now replaces draft-mattsson-t2trg-amplification-attacks instead of None
2023-01-12
00 John Preuß Mattsson New version available: draft-irtf-t2trg-amplification-attacks-00.txt
2023-01-12
00 Ari Keränen WG -00 approved
2023-01-10
00 John Preuß Mattsson Set submitter to "John Preuß Mattsson", replaces to draft-mattsson-t2trg-amplification-attacks and sent approval email to group chairs: t2trg-chairs@ietf.org
2023-01-10
00 John Preuß Mattsson Uploaded new revision