[Chair hat off]
Hi all,
after reading draft-ietf-ace-dtls-authorize I was wondering how the RS
determines what key to use to decrypt noticed that none of the examples
in draft-ietf-ace-cbor-web-token-08 and in
draft-ietf-ace-cwt-proof-of-possession use some form of key id to allow
finding the ap
Mike
-Original Message-
From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Hannes Tschofenig
Sent: Sunday, October 1, 2017 2:40 AM
To: Ace@ietf.org
Subject: [Ace] draft-ietf-ace-cbor-web-token-08 /
draft-ietf-ace-cwt-proof-of-possession
[Chair hat off]
Hi all,
after reading draft-ietf-ace
Hi Hannes,
This is how I think it should be done.
There are two keys that needs to be identified, the key to verify the CWT
and the key to use for the DTLS handshake.
When it comes to verifying the CWT, it is the AS key that should be used. I
donĀ“t think it is unreasonable to assume that the AS