ietf-wg-dance / draft-dance-architecture

Dane Authentication for Network Clients Everywhere
Other
4 stars 5 forks source link

architecture: Anomaly reporting #14

Closed oej closed 1 month ago

oej commented 1 year ago

Missing text. Remove or add?

## Operational anomaly reporting

### MUD reporting for improper provisioning

### XARF for abuse reporting
mcr commented 1 year ago

MUD situation is similiar to #13 , in that the key that signs a MUD file may need to retrieved from DNS.\ How to find the DNS name for verification, and another specification needs to specify this. Mention this in architecture. We are looking for XARF expertise.

oej commented 1 year ago

Remove text from draft