Dear all: I'm looking for a consensus on how to address the following review comment on the 6TiSCH Architecture by Benjamin:
> It would be good to see some architectural discussion about key management > for the link-layer keys. (Given that 802.15.4 leaves key management as out of > scope, it is clearly our problem.) Thus far I don't even have a sense for > when it is > possible to rotate a network's keys. > To which I answered: PT> I'll take that to a separate thread with Michael, Tero and Malisa. It is certainly possible to rotate keys. We had a draft about rekeying that went stale. We isolated cases where this is desirable in the discussion on the minimal security draft. I'm unclear how deep we need to go in this regards vs. what belongs to the minimal security specification. What do you think? Pascal
_______________________________________________ 6tisch mailing list 6tisch@ietf.org https://www.ietf.org/mailman/listinfo/6tisch