[6tisch-security] Fwd: New Version Notification for draft-piro-6tisch-security-issues-03.txt
Giuseppe Piro <peppe@giuseppepiro.com> Thu, 11 December 2014 10:57 UTC
Return-Path: <peppe@giuseppepiro.com>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 797241ACDF1 for <6tisch-security@ietfa.amsl.com>; Thu, 11 Dec 2014 02:57:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.603
X-Spam-Level:
X-Spam-Status: No, score=0.603 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FM_FORGED_GMAIL=0.622, HELO_EQ_IT=0.635, HOST_EQ_IT=1.245, HTML_MESSAGE=0.001] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Odv5gTWBVFAY for <6tisch-security@ietfa.amsl.com>; Thu, 11 Dec 2014 02:57:56 -0800 (PST)
Received: from smtpcmd02111.aruba.it (smtpcmd02111.aruba.it [62.149.158.111]) by ietfa.amsl.com (Postfix) with ESMTP id D90FF1A878C for <6tisch-security@ietf.org>; Thu, 11 Dec 2014 02:57:54 -0800 (PST)
Received: from mail-pa0-f51.google.com ([209.85.220.51]) by smtpcmd02.ad.aruba.it with bizsmtp id SAxp1p01S1788JR01Axr7D; Thu, 11 Dec 2014 11:57:52 +0100
Received: by mail-pa0-f51.google.com with SMTP id ey11so4807444pad.24 for <multiple recipients>; Thu, 11 Dec 2014 02:57:50 -0800 (PST)
X-Received: by 10.68.162.100 with SMTP id xz4mr15998586pbb.138.1418295470209; Thu, 11 Dec 2014 02:57:50 -0800 (PST)
MIME-Version: 1.0
Received: by 10.70.79.10 with HTTP; Thu, 11 Dec 2014 02:57:20 -0800 (PST)
In-Reply-To: <20141211104151.3519.5838.idtracker@ietfa.amsl.com>
References: <20141211104151.3519.5838.idtracker@ietfa.amsl.com>
From: Giuseppe Piro <peppe@giuseppepiro.com>
Date: Thu, 11 Dec 2014 11:57:20 +0100
Message-ID: <CAH-9zkr_S931_g0sEXCwYxZZgGVUofHhUGWuLmxjD82mUaa7sQ@mail.gmail.com>
To: 6tisch-security@ietf.org, "6tisch@ietf.org" <6tisch@ietf.org>
Content-Type: multipart/alternative; boundary="047d7ba96d9cb044a60509eea51d"
Archived-At: http://mailarchive.ietf.org/arch/msg/6tisch-security/BDRmDoBRTBQ4110wwXFrLDHhD0g
Cc: Gennaro Boggia <gennaro.boggia@poliba.it>, Alfredo Grieco <alfredo.grieco@poliba.it>, Giuseppe Piro <giuseppe.piro@poliba.it>
Subject: [6tisch-security] Fwd: New Version Notification for draft-piro-6tisch-security-issues-03.txt
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Dec 2014 10:57:58 -0000
Dear all, a new version of our draft draft-piro-6tisch-security-issues has been submitted. We are still focusing the attention on L2 security aspects (i.e., how generating the key, how storing keys and related attributes within MAC PIB tables, and so on). However, we have revised some concepts by using the terminology introduced by Michael in its ID draft-richardson-6tisch--security-6top, like "production network", "joining node", "production network key", "per-peer L2 key", and so on. Basing on the recent/future discussions in 6tisch security meetings (like those related to the adoption, or not, of the master-fake key, the creation of device descriptors elements, etc.) we will update the document accordingly. We are looking forward to receive comments on that document. Many thanks for your attention and best regards Gennaro, Alfredo, Giuseppe. ---------- Forwarded message ---------- From: <internet-drafts@ietf.org> Date: Thu, Dec 11, 2014 at 11:41 AM Subject: New Version Notification for draft-piro-6tisch-security-issues-03.txt To: Giuseppe Piro <giuseppe.piro@poliba.it>, Gennaro Boggia < gennaro.boggia@poliba.it>, Luigi Alfredo Grieco <alfredo.grieco@poliba.it> A new version of I-D, draft-piro-6tisch-security-issues-03.txt has been successfully submitted by Giuseppe Piro and posted to the IETF repository. Name: draft-piro-6tisch-security-issues Revision: 03 Title: Layer-2 security aspects for the IEEE 802.15.4e MAC Document date: 2014-12-10 Group: Individual Submission Pages: 27 URL: http://www.ietf.org/internet-drafts/draft-piro-6tisch-security-issues-03.txt Status: https://datatracker.ietf.org/doc/draft-piro-6tisch-security-issues/ Htmlized: http://tools.ietf.org/html/draft-piro-6tisch-security-issues-03 Diff: http://www.ietf.org/rfcdiff?url2=draft-piro-6tisch-security-issues-03 Abstract: The aim of this Internet Draft is to define standard compliant procedures for configuring layer-2 security services in IEEE 802.15.4e-based Low-power and Lossy Networks. In particular, it provides a review of security aspects presented in both IEEE 802.15.4-2011 and IEEE 802.15.4e-2012 specifications, the classification of secure network configurations and layer-2 keys, the description of a set of consecutive steps required to establish a layer-2 secure link, and a lightweight Key Management Protocol designed for negotiating a layer-2 one-hop link key. As the final goal, the document would describe how security MAC attributes can by initialized and updated in order to offer layer-2 security services in real networks. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat -- *Giuseppe Piro, PhD* Post Doc Researcher DEI, Politecnico di Bari via Orabona 4 - 70125 (Bari), Italy. email: peppe@giuseppepiro.com phone: +39 080 5963301 web: g <http://telematics.poliba.it/piro>iuseppepiro.com
- [6tisch-security] Fwd: New Version Notification f… Giuseppe Piro