Yes, Don. 

So far I have not seen any 6TiSCH implementation using 802.15.9 but I guess it 
could be added. If people did try please let us now, now is a good time.
It results that at the moment we do not have text on 15.9 at all. It seems a 
bit late to add it now.

What do others think?

All the best,

Pascal

> -----Original Message-----
> From: Don Sturek <d.stu...@att.net>
> Sent: mardi 20 août 2019 22:17
> To: Michael Richardson <mcr+i...@sandelman.ca>; Pascal Thubert (pthubert)
> <pthub...@cisco.com>; Benjamin Kaduk <ka...@mit.edu>; Mališa Vučinić
> <malisa.vuci...@inria.fr>; Tero Kivinen <kivi...@iki.fi>; 6tisch@ietf.org
> Subject: Re: [6tisch] rekeying the 6TiSCH network
> 
> Š. On the rekeying topic for IEEE 802.15.4.
> 
> Have a look at IEEE 802.15.9.   It takes existing key establishment
> protocols (IEEE 802.1x, etc.) and provides encapsulation over IEEE 802.15.4.
> 
>  IEEE 802.15.9 does not solve all of your rekey needs but the tools are there
> when you agree on how you want rekeying to work.
> 
> Don
> 
> 
> 
> On 8/20/19, 1:03 PM, "6tisch on behalf of Michael Richardson"
> <6tisch-boun...@ietf.org on behalf of mcr+i...@sandelman.ca> wrote:
> 
> >
> >Pascal Thubert (pthubert) <pthub...@cisco.com> wrote:
> >    > I'm looking for a consensus on how to address the following review
> >    > comment on the 6TiSCH Architecture by Benjamin:
> >
> >    >> It would be good to see some architectural discussion about key
> >    >> management
> >    >> for the link-layer keys.  (Given that 802.15.4 leaves key
> >management
> >    >> as out of
> >    >> scope, it is clearly our problem.)  Thus far I don't even have a
> >sense
> >    >> for when it is
> >    >> possible to rotate a network's keys.
> >
> >    PT> I'll take that to a separate thread with Michael, Tero and
> >Malisa. It
> >    PT> is certainly possible to rotate keys. We had a draft about
> >rekeying
> >    PT> that went stale. We isolated cases where this is desirable in the
> >    PT> discussion on the minimal security draft. I'm unclear how deep we
> >    PT> need to go in this regards vs. what belongs to the minimal
> >security
> >    PT> specification.
> >
> >6tisch-minimal-security has a section 8.2 "Parameter Update Exchange"
> >Maybe it should include "(and Rekey)"
> >
> >We further have section 8.4.3.1 and 8.4.3.2 to explain how to use that
> >to rekey the entire network.
> >
> >I'm not sure what's in the Architecture document about this, but I'd
> >rather that it just said less.
> >
> >--
> >Michael Richardson <mcr+i...@sandelman.ca>, Sandelman Software Works
> >-= IPv6 IoT consulting =-
> >
> >
> >
> >_______________________________________________
> >6tisch mailing list
> >6tisch@ietf.org
> >https://www.ietf.org/mailman/listinfo/6tisch
> 

_______________________________________________
6tisch mailing list
6tisch@ietf.org
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to