CoRE Working Group Z. Shelby, Ed. Internet-Draft Sensinode Intended status: Standards Track C. Bormann Expires:April 21,July 29, 2011 Universitaet Bremen TZIOctober 18, 2010January 25, 2011 Blockwise transfers in CoAPdraft-ietf-core-block-00draft-ietf-core-block-01 Abstract CoAP is a RESTful transfer protocol for constrained nodes and networks. CoAP is based on datagram transport, which limits the maximum size of resource representations that can be transferred without too much fragmentation. The Block option provides a minimal way to transfer larger representations in a block-wise fashion. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onApril 21,July 29, 2011. Copyright Notice Copyright (c)20102011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. Block-wise transfers . . . . . . . . . . . . . . . . . . . . .45 2.1. The Block Option . . . . . . . . . . . . . . . . . . . . .45 2.2. Using the Block Option . . . . . . . . . . . . . . . . . .67 3.IANA ConsiderationsExamples . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14 5. Security Considerations . . . . . . . . . . . . . . . . . . .10 4.1.15 5.1. Mitigating Resource Exhaustion Attacks . . . . . . . . . . 15 5.2. Mitigating Amplification Attacks . . . . . . . . . . . . .10 5.16 6. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . .11 6.17 7. References . . . . . . . . . . . . . . . . . . . . . . . . . .12 6.1.18 7.1. Normative References . . . . . . . . . . . . . . . . . . .12 6.2.18 7.2. Informative References . . . . . . . . . . . . . . . . . .1218 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .1319 1. Introduction The CoRE WG is tasked with standardizing an Application Protocol for Constrained Networks/Nodes, CoAP. This protocol is intended to provide RESTful [REST] services not unlike HTTP [RFC2616], while reducing the complexity of implementation as well as the size of packets exchanged in order to make these services useful in a highly constrained network of themselves highly constrained nodes. This objective requires restraint in a number of sometimes conflicting ways: o reducing implementation complexity in order to minimize code size, o reducing message sizes in order to minimize the number of fragments needed for each message (in turn to maximize the probability of delivery of the message), the amount of transmission power needed and the loading of the limited-bandwidth channel, o reducing requirements on the environment such as stable storage, good sources of randomness or user interaction capabilities. CoAP is based on datagram transports such as UDP, which limit the maximum size of resource representations that can be transferred without creating unreasonable levels of IP fragmentation.The Block option provides a minimal way to transfer larger resource representations in a block-wise fashion.Inthis document, the key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as described in BCP 14 [RFC2119] and indicate requirement levels for compliant CoAP implementations. 2. Block-wise transfers Notaddition, not all resource representations will fit into a single link layer packet of a constrainednetwork.network, which may cause adaptation layer fragmentation even if IP layer fragmentation is not required. Using fragmentation (either at the adaptation layer or at the IP layer) to enable the transport of larger representations is possible up to the maximum size of the underlying datagram protocol (such as UDP), but thefragmentation/ reassemblyfragmentation/reassembly process loads the lower layers with conversation state that is better managed in the application layer. This specificationproposes andefines a CoAP option to enable _block-wise_ access to resource representations. The Block option provides a minimal way to transfer larger resource representations in a block- wise fashion. The overriding objective is to avoid creating conversation state at the server for block-wise GET requests. (It is impossible to fully avoid creating conversation state for POST/PUT, if the creation/replacement of resources is to be atomic; where that property is not needed, there is no need to create server conversation state in this case, either.)Implementation of theIn summary, this specification adds a Block optionis intendedtobe optional. However, when it is present in aCoAPmessage, it MUSTthat can beprocessed; therefore it is identified as a critical option. The sizeused for block-wise transfers. Benefits ofthe blocks should notusing this option include: o Transfers larger than can befixed by the protocol. On the other hand, implementation shouldaccommodated in constrained-network link-layer packets can beas simple as possible.performed in smaller blocks. o No hard-to-manage conversation state is created at the adaptation layer or IP layer for fragmentation. o TheBlock option therefore supports a small rangetransfer ofpower-of-twoeach blocksizes, from 2^4 (16) tois acknowledged, enabling retransmission if required. o Both sides have a say in the block size that actually will be used. o The resulting exchanges are easy to understand using packet analyzer tools and thus quite accessible to debugging. o If needed, the Block option can also be used as is to provide random access to power-of-two sized blocks within a resource representation. The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119, BCP 14 [RFC2119] and indicate requirement levels for compliant CoAP implementations. In this document, the term "byte" is used in its now customary sense as a synonym for "octet". Where bit arithmetic is explained, this document uses the notation familiar from the programming language C, except that the operator "^" stands for exponentiation. 2. Block-wise transfers 2.1. The Block Option +------+-----+-------+-----------+--------+---------------+ | Type | C/E | Name | Data type | Length | Default | +------+-----+-------+-----------+--------+---------------+ | 13 | C | Block | uint | 1-3 B | 0 (see below) | +------+-----+-------+-----------+--------+---------------+ Implementation of the Block option is intended to be optional. However, when it is present in a CoAP message, it MUST be processed (or the message rejected); therefore it is identified as a critical option. The size of the blocks should not be fixed by the protocol. On the other hand, implementation should be as simple as possible. The Block option therefore supports a small range of power-of-two block sizes, from 2^4 (16) to 2^11 (2048) bytes. One of these eight values can be encoded in three bits (0 for 2^4 to 7 for 2^11 bytes), which we call the "SZX" (size exponent); the actual block size is then "1 << (SZX + 4)".2.1. The Block OptionWhen a representation is larger than can be comfortably transferred in a single UDP datagram, the Block option can be used to indicate a block-wise transfer. Block is a 1-, 2- or 3-byte integer, the four least significant bits of which indicate the size and whether the current block-wise transfer is the last block being transferred (M or "more" bit). The option value divided by sixteen is the number of the block currently being transferred, starting from zero, i.e., the current transfer is about the "size" bytes starting at byte "block number << (SZX + 4)". The default value of the Block Option is zero, indicating that the current block is the first (block number 0) and only (M bit not set) block of the transfer; however, there is no explicit size implied by this default value. 0 0 1 2 3 4 5 6 7 +-+-+-+-+-+-+-+-+ | NUM |M| SZX | +-+-+-+-+-+-+-+-+ 0 1 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | NUM |M| SZX | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 0 1 2 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | NUM |M| SZX | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Figure 1: Block option (Notethatthat, as an implementation convenience, the option value with the last 4 bits masked out, shifted to the left by the value of SZX, gives the byte position of the block.) NUM: Block Number. The block number is avariable 4-20 bitvariable-size (4, 12, or 20 bit) unsigned integer indicating the block number being requested or provided. Block number 0 indicates the first block of a representation. M: More Flag. This flag indicates if this block is the last in a representation when set. When not set it indicates that there are one or more blocks available. When the block option is used to retrieve a specific block number the M bit MUST be sent as zero and ignored on reception. SZX: Block Size. The block sizeindicatesis a three-bit unsigned integer indicating the size of a block to the power of two. Thus block size = 2^(SZX + 4).ThusAs there are three bits available for SZX, the minimum block size is 2^(0+4) = 16 and the maximum is 2^(7+4) = 2048. The Block option is used in one of three roles: o In the request for a GET, the Block option gives the block number requested and suggests a block size (block number 0) or echoes the block size of previous blocks received (block numbers other than 0). o In the response for a GET or in the request for a PUT or POST, the Block option describes what block number is contained in the payload, and whether further blocks arepartrequired to complete the transfer of that body (M bit). If the M bit is set, the size of the payload body in bytes MUST indeed be the power of two given by the block size. All blocks for a RESTtransactiontransfer MUST use the same block size, except for the last block (M bit not set). o In the response for a PUT or POST, the Block option indicates what block number is being acknowledged. In this case, the M bit is set to indicate that this response does not carry the final response to the request; this can occur when the M bit was set in the request and the server implements PUT/POST atomically (i.e., acts only upon reception of the last block). 2.2. Using the Block Option Using the Block option, a single REST operation can be split into multiple CoAP messagetransactions.exchanges. Each of these messagetransactionsexchanges uses their own CoAPtransactionMessage ID. When a GET is answered with a response carrying a Block option with the M bit set, therequestorrequester may retrieve additional blocks of the resource representation by sending requests with a Block option giving the block number desired. In such a Block option, the M bit MUST be sent as zero and ignored on reception. To influence the block size used in response to a GET request, therequestorrequester uses the Block option, giving the desired size, a block number of zero and an M bit of zero. A server SHOULD use the block size indicated or a smaller size. Any further block-wise requests for blocks beyond the first one MUST indicate the same block size that wasalreadyusedinby the server in the response for the first one. If the Block option is used by therequestor,requester, all GET requests in a singletransaction (except fortransfer MUST ultimately use the same size, except that there may not be enough content to fill the last block (the one returned with the M bit notset) MUST ultimately use the same size.set). The server SHOULD use the block size indicated in the request option or a smaller size, but therequestorrequester MUST take note of the actual block size used in the response it receives to its initial GET and proceed to use it in subsequent GETs; the server behavior MUST ensure that this client behavior results in the same block size for all responses in a sequence (except for the last one with the M bit not set). Block-wise transfers can be used to GET resources the representations of which are entirely static (not changing over time at all, such as in a schema describing a device), or for dynamically changing resources. In the latter case, the Block option SHOULD be used in conjunction with the Etag option, to ensure that the blocks being reassembled are from the same version of the representation. When reassembling the representation from the blocks being exchanged, the reassembler MUST compare Etag options. If the Etag options do not match in a GET transfer, therequestorrequester has the option of attempting to retrieve fresh values for the blocks it retrieved first. To minimize the resulting inefficiency, the server MAY cache the current value of a representation for an ongoing sequence of requests, but there is no requirement for the server to establish any state. The client MAY facilitate identifying the sequence by using the Tokenoption.option with a non-default value. In a PUT or POST transfer, the Block option refers to the body in the request, i.e., there is no way to perform a block-wise retrieval of the body of the response. Servers that do need to supply large bodies in response to PUT/POST SHOULD therefore be employingredirects.mechanisms such as providing a location for a resource that can be used in a GET to obtain that information. In a PUT or POST transfer that is intended to be implemented in an atomic fashion at the server, the actual creation/replacement takes place at the time the final block, i.e. a block with the M bitunsetunset, is received. If not all previous blocks are available at the server at this time, the transfer fails and error code4__ (TBD)4.08 (Request Entity Incomplete) MUST be returned. The error code4__4.13 (Request Entity Too Large) canalsobe returned at any time by a server that does not currently have the resources to store blocks for a block-wise PUT or POST transfer that it would intend to implement in an atomic fashion. If multiple concurrently proceeding block-wise PUT or POST operations are possible, therequestorrequester SHOULD use the Token option to clearly separate the different sequences. In this case, when reassembling the representation from the blocks being exchanged to enable atomic processing, the reassembler MUST compare any Token options present(taking(and, as usual, taking an absent Token option to default to the empty Token). If atomic processing is not desired, there is no need tocheckprocess the Tokenoption. In summary, this specification: Addsoption (but it is still returned in the response as usual). 3. Examples This section gives aBlock Option that can be usednumber of short examples with message flows for a block-wisetransfers. Benefits: Transfers larger than can be accommodated in constrained- network link-layer packets can be performedGET, and for a PUT or POST. These examples demonstrate the basic operation, the operation insmaller blocks. No hard-to-manage conversation state is created attheadaptation layer or IP layerpresence of retransmissions, and examples forfragmentation. The transferthe operation ofeachthe blockis acknowledged, enabling retransmission if required. Both sides havesize negotiation. In all these examples, asayblock option is shown in a decomposed way separating the block number (NUM), more bit (M), and block sizethat actually willexponent (2^(SZX+4)) by slashes. E.g., a block option value of 33 would beused. TBD: Give examples with detailed message flows forshown as 2/0/32, or ablock-wise GET, PUTblock option value of 59 would be shown as 3/1/128. The first example (Figure 2) shows a GET request that is split into three blocks. The server proposes a block size of 128, andPOST. 3. IANA Considerations This draft addsthefollowing option number to Table 2client agrees. The first two ACKs contain 128 bytes of[I-D.ietf-core-coap]: +------+-----+-------+----------------+--------+--------------------+payload each, and third ACK contains between 1 and 128 bytes. CLIENT SERVER |Type|C/E|NameCON [MID=1234], GET, /status ------> |Data type|Length|Default|+------+-----+-------+----------------+--------+--------------------+<------ ACK [MID=1234], 2.00 OK, 0/1/128 |13|C|Block|UnsignedCON [MID=1235], GET, /status, 1/0/128 ------> |1-3 B|0 (see| | <------ ACK [MID=1235], 2.00 OK, 1/1/128 | | |Integer| CON [MID=1236], GET, /status, 2/0/128 ------> |Section 2.1)|+------+-----+-------+----------------+--------+--------------------+ 4. Security Considerations TBD. (Weigh| | <------ ACK [MID=1236], 2.00 OK, 2/0/128 | Figure 2: Simple blockwise GET In the second example (Figure 3), the client anticipates the blockwise transfer (e.g., because of a size indication in the link- format description) and sends a size proposal. All ACK messages except for the last carry 64 bytes of payload; the last one carries between 1 and 64 bytes. CLIENT SERVER | | | CON [MID=1234], GET, /status, 0/0/64 ------> | | | | <------ ACK [MID=1234], 2.00 OK, 0/1/64 | | | | CON [MID=1235], GET, /status, 1/0/64 ------> | | | | <------ ACK [MID=1235], 2.00 OK, 1/1/64 | : : : ... : : : | CON [MID=1238], GET, /status, 4/0/64 ------> | | | | <------ ACK [MID=1238], 2.00 OK, 4/1/64 | | | | CON [MID=1239], GET, /status, 5/0/64 ------> | | | | <------ ACK [MID=1239], 2.00 OK, 5/0/64 | Figure 3: Blockwise GET with early negotiation In the third example (Figure 4), the client is surprised by the need for a blockwise transfer, and unhappy with the size chosen unilaterally by the server. As it did not send a size proposal initially, the negotiation only influences the size from the second message exchange. Since the client already obtained both the first and second 64-byte block in the first 128-byte exchange, it goes on requesting the third 64-byte block. None of this is understood by the server, which simply responds to the requests as it best can. CLIENT SERVER | | | CON [MID=1234], GET, /status ------> | | | | <------ ACK [MID=1234], 2.00 OK, 0/1/128 | | | | CON [MID=1235], GET, /status, 2/0/64 ------> | | | | <------ ACK [MID=1235], 2.00 OK, 2/1/64 | | | | CON [MID=1236], GET, /status, 3/0/64 ------> | | | | <------ ACK [MID=1236], 2.00 OK, 3/1/64 | | | | CON [MID=1237], GET, /status, 4/0/64 ------> | | | | <------ ACK [MID=1237], 2.00 OK, 4/1/64 | | | | CON [MID=1238], GET, /status, 5/0/64 ------> | | | | <------ ACK [MID=1238], 2.00 OK, 5/0/64 | Figure 4: Blockwise GET with late negotiation In all these (and the following) cases, retransmissions are handled by the CoAP message exchange layer, so they don't influence the block operations (Figure 5, Figure 6). CLIENT SERVER | | | CON [MID=1234], GET, /status ------> | | | | <------ ACK [MID=1234], 2.00 OK, 0/1/128 | | | | CON [MID=1235], GE///////////////////////// | | | | (timeout) | | | | CON [MID=1235], GET, /status, 2/0/64 ------> | | | | <------ ACK [MID=1235], 2.00 OK, 2/1/64 | : : : ... : : : | CON [MID=1238], GET, /status, 5/0/64 ------> | | | | <------ ACK [MID=1238], 2.00 OK, 5/0/64 | Figure 5: Blockwise GET with late negotiation and lost CON CLIENT SERVER | | | CON [MID=1234], GET, /status ------> | | | | <------ ACK [MID=1234], 2.00 OK, 0/1/128 | | | | CON [MID=1235], GET, /status, 2/0/64 ------> | | | | /////////////////////////////////OK, 2/1/64 | | | | (timeout) | | | | CON [MID=1235], GET, /status, 2/0/64 ------> | | | | <------ ACK [MID=1235], 2.00 OK, 2/1/64 | : : : ... : : : | CON [MID=1238], GET, /status, 5/0/64 ------> | | | | <------ ACK [MID=1238], 2.00 OK, 5/0/64 | Figure 6: Blockwise GET with late negotiation and lost ACK The following examples demonstrate a PUT exchange; a POST exchange looks the same, with different requirements on atomicity/idempotence. To ensure that the blocks relate to the same version of the resource representation carried in the request, the client in Figure 7 sets the Token to "v17" in all requests. Note that, as with the GET, the responses to the requests that have a more bit in the request block option are provisional; only the final response tells the client that the PUT succeeded. CLIENT SERVER | | | CON [MID=1234], PUT, /options, v17, 0/1/128 ------> | | | | <------ ACK [MID=1234], 2.04 Changed, 0/1/128 | | | | CON [MID=1235], PUT, /options, v17, 1/1/12 ------> | | | | <------ ACK [MID=1235], 2.04 Changed, 1/1/128 | | | | CON [MID=1236], PUT, /options, v17, 2/0/128 ------> | | | | <------ ACK [MID=1236], 2.04 Changed, 2/0/128 | Figure 7: Simple atomic blockwise PUT A stateless server that simply builds/updates the resource in place (statelessly) may indicate this by not setting the more bit in the response (Figure 8); in this case, the response codes are valid separately for each block being updated. This is of course only an acceptable behavior of the server if the potential inconsistency present during the run of the message exchange sequence does not lead to problems, e.g. because the resource being created or changed is not yet or not currently in use. CLIENT SERVER | | | CON [MID=1234], PUT, /options, v17, 0/1/128 ------> | | | | <------ ACK [MID=1234], 2.04 Changed, 0/0/128 | | | | CON [MID=1235], PUT, /options, v17, 1/1/12 ------> | | | | <------ ACK [MID=1235], 2.04 Changed, 1/0/128 | | | | CON [MID=1236], PUT, /options, v17, 2/0/128 ------> | | | | <------ ACK [MID=1236], 2.04 Changed, 2/0/128 | Figure 8: Simple stateless blockwise PUT 4. IANA Considerations This draft adds the following option number to the CoAP Option Numbers registry of [I-D.ietf-core-coap]: +--------+-------+-------------+ | Number | Name | Reference | +--------+-------+-------------+ | 13 | Block | Section 2.1 | +--------+-------+-------------+ Table 1: CoAP Option Numbers This draft adds the following response code to the CoAP Response Codes registry of [I-D.ietf-core-coap]: +------+--------------------------------+-------------+ | Code | Description | Reference | +------+--------------------------------+-------------+ | 136 | 4.08 Request Entity Incomplete | Section 2.1 | +------+--------------------------------+-------------+ Table 2: CoAP Response Codes 5. Security Considerations Providing access to blocks within a resource may lead to surprising vulnerabilities. Where requests are not implemented atomically, an attacker may be able to exploit a race condition or confuse a server by inducing it to use a partially updated resource representation. Partial transfers may also make certain problematic data invisible to intrusion detection systems; it is RECOMMENDED that an intrusion detection system (IDS) that analyzes resource representations transferred by CoAP implement the Block option to gain access to entire resource representations. Still, approaches such as transferring even-numbered blocks on one path and odd-numbered blocks on another path, or even transferring blocks multiple times with different content and obtaining a different interpretation of temporal order at the IDS than at the server, may prevent an IDS from seeing the whole picture. These kinds of attacks are well understood from IP fragmentation and TCP segmentation; CoAP does not add fundamentally new considerations. Where access to a resource is only granted to clients making use of a specific security association, all blocks of that resource MUST be subject to the same security checks; it MUST NOT be possible for unprotected exchanges to influence blocks of an otherwise protected resource. As a related consideration, where object security is employed, PUT/POST should be implemented in the atomic fashion, unless the object securityimplicationsoperation is performed on each access and the creation of unusable resources can be tolerated. 5.1. Mitigating Resource Exhaustion Attacks Certain blockwise requests may induce the server to create state, e.g. to create a snapshot for the blockwise GET of a fast-changing resource to enable consistent access to the same version of a resource for all blocks, or to create temporary resource representations that are collected until pressed into service by a final PUT or POST with the more bit unset. All mechanisms that induce a server to create state that cannot simply be cleaned up create opportunities for denial-of-service attacks. Servers SHOULD avoid being subject to resource exhaustion based on state created by untrusted sources. But even if this is done, the mitigation may cause a denial-of-service to a legitimate request when it is drowned out by other state-creating requests. Wherever possible, servers should therefore minimize the opportunities to create state for untrusted sources, e.g. by using stateless approaches. Performing segmentation at the application layerblock- wise transfer against those of adaptation-layeris almost always better in this respect than at the transport layer or lower (IP fragmentation, adaptation layer fragmentation), e.g. because there is application layer semantics that can be used for mitigation orIP-layer fragmentation.) 4.1.because lower layers provide security associations that can prevent attacks. However, it is less common to apply timeouts and keepalive mechanisms at the application layer than at lower layers. Servers MAY want to clean up accreted state by timing it out (cf. response code 4.08), and clients SHOULD be prepared to run blockwise transfers in an expedient way to minimize the likelihood of running into such a timeout. 5.2. Mitigating Amplification AttacksTBD. (This section[I-D.ietf-core-coap] discusseshow CoAP nodes could become implicated in DoS attacks by usingtheamplifying propertiessusceptibility ofthe protocol, as well as mitigationsCoAP end-points forthis threat.)use in amplification attacks. A CoAP server can reduce the amount of amplification it provides to an attacker by offering large resource representations only in relatively small blocks.E.g.,With this, e.g., for a 1000 byte resource, a 10-byte request might result in an 80-byte response (with a 64-byte block) instead of a 1016-byte response, considerably reducing the amplification provided.5.6. AcknowledgementsOf course, muchMuch of the content of this draft is the result of discussions with the [I-D.ietf-core-coap]authors.authors, and via many CoRE WG discussions. Tokens were suggested by Gilman Tolle and refined by Klaus Hartke.6.7. References6.1.7.1. Normative References [I-D.ietf-core-coap] Shelby, Z., Frank, B., and D. Sturek, "Constrained Application Protocol (CoAP)",draft-ietf-core-coap-02draft-ietf-core-coap-03 (work in progress),SeptemberOctober 2010. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999.6.2.7.2. Informative References [REST] Fielding, R., "Architectural Styles and the Design of Network-based Software Architectures", 2000. Authors' Addresses Zach Shelby (editor) Sensinode Kidekuja 2 Vuokatti 88600FINLANDFinland Phone: +358407796297 Email: zach@sensinode.com Carsten Bormann Universitaet Bremen TZI Postfach 330440 Bremen D-28359 Germany Phone: +49-421-218-63921 Fax: +49-421-218-7000 Email: cabo@tzi.org