Jim - am I right that the text you were suggesting be added to the "kid"
treatment is that in the thread "[Ace] Text for KID in POP" which introduces
the text in
https://mailarchive.ietf.org/arch/msg/ace/v_Ci7kRMC0poffGmrSNYb5-sjrA and
corrects it in
https://mailarchive.ietf.org/arch/msg/ace/g
Hello Ben,
Thanks for comments!
On 2018-11-08, 05:56, "Ace on behalf of Damm, Benjamin" wrote:
Hello ace,
We've done an internal review of EDHOC and support its movement towards
RFC. A few questions:
* It isn't clear (to us) how EDHOC's message 2 achieves proof of
Hi Owen,
In constrained radio deployments where throughput is the limiting factor, the
number of bytes in the bootstrapping can make a huge difference.
The number of bytes is directly related to the minimum number of frames (in
6tisch each frame can typically carry around 80 bytes of payload) a
I do not believe that the big comment that I have left has been addressed.
From: Mike Jones
Sent: Tuesday, November 6, 2018 3:43 PM
To: Roman Danyliw ; ace@ietf.org
Cc: Jim Schaad
Subject: RE: Summarizing WGLC discussion of
draft-ietf-ace-cwt-proof-of-possession
Thanks for the useful sum
Hello ace,
We've done an internal review of EDHOC and support its movement towards
RFC. A few questions:
* It isn't clear (to us) how EDHOC's message 2 achieves proof of
possession prior to use. NIST SP-800-56A seems fairly clear that proof
of possession is required before confirmation of
Hi all,
This update includes all but one comment from the WGLC review by Jim:
https://mailarchive.ietf.org/arch/msg/ace/A8ko4sAmG9CODbZDWN7APzqkyvs .
The comment left will be discussed tomorrow in the ace meeting, and is about
the nonce mechanism that was discussed in the thread above.
Thanks,
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for
Constrained Environments WG of the IETF.
Title : OSCORE profile of the Authentication and
Authorization for Constrained Environ