Mohit
Thanks for the update. I'm looking forward to the discussion in ACE.
Hendrik
Von: Mohit Sahni
Gesendet: Dienstag, 14. Juli 2020 00:06
Hi All
I have published the first draft for the document here is the link to the draft
https://datatracker.ietf.org/doc/draft-msahni-ace-cmpv2-coap-trans
Hi All
I have published the first draft for the document here is the link to the
draft
https://datatracker.ietf.org/doc/draft-msahni-ace-cmpv2-coap-transport/ .
As Jim mentioned that adopting this might need change in the ACE WG charter
can we please discuss that in IETF 108 ?
Thanks
Mohit
On Sat
We are collecting agenda items for IETF 108. We have a 100 minute slot at
the meeting and I am sure that it will be overflowing. If you want to be on
the agenda please let the chairs know.
Please include the following data in your agenda request:
1. The document(s) that the presentation applies
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for
Constrained Environments WG of the IETF.
Title : Key Management for OSCORE Groups in ACE
Authors : Marco Tiloca
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for
Constrained Environments WG of the IETF.
Title : Admin Interface for the OSCORE Group Manager
Authors : Marco T
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for
Constrained Environments WG of the IETF.
Title : Key Provisioning for Group Communication using ACE
Authors : F
Hi Christian,
On 07/13/2020 05:12 PM, Christian Amsüss wrote:
>
> * A malicious attacker intercepts the discovery process, and tells C
> that there is an RD at
> `;rt=core.rd`
> (which is a perfectly legitimate service we're running there for
> commercial purposes; its interface is that y
Hello ACE,
piecing together parts of the big picture of Resource Directory, CoRAL
forms and ACE, I was wondering where in the whole story the client
should tie its intention to the key material it uses to authorize an
action.
Take this -- admittedly contrived, but hopefully illustrative example:
Hello,
I've submitted a new version in preparation for the next meeting.
This version implements the change from the originally proposed scope
format to AIF.
There are 1-2 issues outstanding (regarding session continuation), which
will be discussed in the WG meeting.
Thanks,
--Cigdem
On Mon, Jul
A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Authentication and Authorization for
Constrained Environments WG of the IETF.
Title : MQTT-TLS profile of ACE
Authors : Cigdem Sengul
10 matches
Mail list logo