Re: [6tisch-security] minimal security draft

Tero Kivinen <kivinen@iki.fi> Thu, 09 February 2017 13:15 UTC

Return-Path: <kivinen@iki.fi>
X-Original-To: 6tisch-security@ietfa.amsl.com
Delivered-To: 6tisch-security@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7A2DD129A04 for <6tisch-security@ietfa.amsl.com>; Thu, 9 Feb 2017 05:15:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.12
X-Spam-Level:
X-Spam-Status: No, score=-1.12 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_NEUTRAL=0.779, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mYeOFWg-HOWF for <6tisch-security@ietfa.amsl.com>; Thu, 9 Feb 2017 05:15:40 -0800 (PST)
Received: from mail.kivinen.iki.fi (fireball.acr.fi [83.145.195.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A10CB1299FD for <6tisch-security@ietf.org>; Thu, 9 Feb 2017 05:15:39 -0800 (PST)
Received: from fireball.acr.fi (localhost [127.0.0.1]) by mail.kivinen.iki.fi (8.15.2/8.15.2) with ESMTPS id v19DFZTS011997 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Thu, 9 Feb 2017 15:15:35 +0200 (EET)
Received: (from kivinen@localhost) by fireball.acr.fi (8.15.2/8.14.8/Submit) id v19DFYal001564; Thu, 9 Feb 2017 15:15:34 +0200 (EET)
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-2"
Content-Transfer-Encoding: quoted-printable
Message-ID: <22684.27510.499873.955382@fireball.acr.fi>
Date: Thu, 09 Feb 2017 15:15:34 +0200
From: Tero Kivinen <kivinen@iki.fi>
To: Mališa Vučinić <malisa.vucinic@inria.fr>
In-Reply-To: <6D6AE790-1234-403B-9429-992B4E168AF3@inria.fr>
References: <1f99708ffbacaa7235d05b535f669291@xs4all.nl> <6D6AE790-1234-403B-9429-992B4E168AF3@inria.fr>
X-Mailer: VM 8.2.0b under 25.1.1 (x86_64--netbsd)
X-Edit-Time: 2 min
X-Total-Time: 1 min
Archived-At: <https://mailarchive.ietf.org/arch/msg/6tisch-security/fILxDbXy_MLyVDcIjj6pMloDR1s>
Cc: 6tisch Security <6tisch-security@ietf.org>, consultancy@vanderstok.org
Subject: Re: [6tisch-security] minimal security draft
X-BeenThere: 6tisch-security@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Extended Design Team for 6TiSCH security architecture <6tisch-security.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/6tisch-security/>
List-Post: <mailto:6tisch-security@ietf.org>
List-Help: <mailto:6tisch-security-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/6tisch-security>, <mailto:6tisch-security-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2017 13:15:40 -0000

Mališa Vučinić writes:
> Hello Peter,
> 
> We use COSE Key Set structure to transport link-layer keys. Key set
> is a CBOR array, while each key in the array is specified as a CBOR
> map object. This is quite flexible and relies on the already
> standardized document (COSE). We then bundle Key Set object together
> with a short 15.4 address to create a response that fits within a
> single 15.4 frame. For more details refer to Section 4.4 of
> minimal-security draft. 

You would also need to have 802.15.4 specific key identification
information, i.e. the KeyIdMode, KeyIndex (if KeyIdMode is not 0) and
KeySource (if KeyIdMode is 2 or 3).
-- 
kivinen@iki.fi