Why restriction on reading messages? It is not like an external observer is not going to be able to see the lights go on or off.
I am not sure what you mean by synchronous manner. Does this mean that the light needs to change state between the command and the response message? (As opposed to an asynchronous manner.) Or do you mean in a synchronized manner where everything happens at a given time relative to the command (which could be all at the same time). The solution in section 4 does not seem to meet the following requirement "Only authorized members of the application group must be able to read and process messages." The statement is made that AT-R tokens with references are more efficient from a bandwidth point of view. Does this mean that there is going to be a recommendation that these be provided prior to the first command so that all n devices dereferencing the pointer will not kill the bandwidth? This document needs to have a solution for dealing with nonce space allocation for the cases where more than one sender is going be able to use the same key. This is going to be part of the problems with replay detection as well as security considerations. Should the algorithms be using high water detection of sequence numbers rather than the case of not yet used? Or is that an application specific type thing? How does section 5.2 Token Verification reconcile with the idea of doing references in AT-R tokens? In section 6.3, if a device has multiple security domains, why could they not come from multiple KDCs? The term low latency needs to be much more clearly defined about what it means in this context. In a manufacturing facility, I might have a tighter latency requirement for communicating commands to valves that I would on dealing with lights that might take a while to come on anyway. Does that mean that you feel that this would be an ideal solution for such an environment? The same thing might easily be said for emergency alarms. I want all of them to come on and come on fast in the event of an emergency. A better description of what is meant by low-latency is clearly needed. I do not think that the current security requirements is sufficiently strident to reflect both the threat of breakage, cross-breakage and restrictions on where it should be used to pass muster. Jim _______________________________________________ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace