MUD (D)TLS profiles for IoT devices
draft-reddy-opswg-mud-tls-00
| Document | Type | Replaced Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Tirumaleswar Reddy.K , Dan Wing | ||
| Last updated | 2019-07-08 | ||
| Replaced by | draft-reddy-opsawg-mud-tls | ||
| Stream | (None) | ||
| Intended RFC status | (None) | ||
| Formats |
Expired & archived
plain text
xml
htmlized
pdfized
bibtex
|
||
| Stream | Stream state | (No stream defined) | |
| Consensus boilerplate | Unknown | ||
| RFC Editor Note | (None) | ||
| IESG | IESG state | Replaced by draft-reddy-opsawg-mud-tls | |
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
This Internet-Draft is no longer active. A copy of
the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-reddy-opswg-mud-tls-00.txt
https://www.ietf.org/archive/id/draft-reddy-opswg-mud-tls-00.txt
Abstract
This memo extends Manufacturer Usage Description (MUD) to model DTLS and TLS usage. This allows a network element to notice abnormal DTLS or TLS usage which has been strong indicator of other software running on the endpoint, typically malware.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)