You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the CoAP block-wise transfer process, once the block size has been expressed by the server, it is expected that all entities will adhere to this agreed-upon size for the remainder of the data exchange. A non-conformance issue arises when a server receives a message with a block size that deviates from the one previously agreed-upon and does not generate an error or ignore it.
In response to a request with a payload (e.g., a PUT or POST transfer), the block size given in the Block1 Option indicates the block size preference of the server for this resource.
...
the client SHOULD heed the preference indicated and, for all further blocks, use the block size preferred by the server or a smaller one.
Actual Behavior
In this case, for the second block in a block-wise transfer, block size is considered to be 256 rather than the agreed-upon value (64). Upon receiving this invalid value, server does not generate any error code.
Environment
Problem Description
In the CoAP block-wise transfer process, once the block size has been expressed by the server, it is expected that all entities will adhere to this agreed-upon size for the remainder of the data exchange. A non-conformance issue arises when a server receives a message with a block size that deviates from the one previously agreed-upon and does not generate an error or ignore it.
Expected Behavior
The RFC 7959 requires that:
Actual Behavior
In this case, for the second block in a block-wise transfer, block size is considered to be 256 rather than the agreed-upon value (64). Upon receiving this invalid value, server does not generate any error code.
You can find the Wireshark interaction in the following:
further-request-non.zip
The text was updated successfully, but these errors were encountered: