Dear all:

I'm looking for a consensus on how to address the following review comment on 
the 6TiSCH Architecture by Benjamin:



> It would be good to see some architectural discussion about key management

> for the link-layer keys.  (Given that 802.15.4 leaves key management as out of

> scope, it is clearly our problem.)  Thus far I don't even have a sense for 
> when it is

> possible to rotate a network's keys.

>



To which I answered:


PT> I'll take that to a separate thread with Michael, Tero and Malisa. It is 
certainly possible to rotate keys. We had a draft about rekeying that went 
stale. We isolated cases where this is desirable in the discussion on the 
minimal security draft. I'm unclear how deep we need to go in this regards vs. 
what belongs to the minimal security specification.

What do you think?

Pascal
_______________________________________________
6tisch mailing list
6tisch@ietf.org
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to