Re: [Ace] [Emu] New Version Notification for draft-ietf-ace-wg-coap-eap-04.txt

Dan Garcia Carrillo <garciadan@uniovi.es> Thu, 02 December 2021 11:29 UTC

Return-Path: <garciadan@uniovi.es>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 132293A1064; Thu, 2 Dec 2021 03:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.741
X-Spam-Level:
X-Spam-Status: No, score=-3.741 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-1.852, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=unioviedo.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id e7eURd2Y5ymQ; Thu, 2 Dec 2021 03:29:21 -0800 (PST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40066.outbound.protection.outlook.com [40.107.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE3853A1063; Thu, 2 Dec 2021 03:29:19 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VDFI1eUI+vVf7YY7z2oot9sngcfRCzvfeVceToLGa4+D7sC5ppxGjjQml4Amj5kO+JtuGrSuGpjZe+3aEM/kB83xa8UL4vp4/KfvIMjtV3pNlHr4MYU6YK3O9ERO0etlDUYT/KRmgPVQAWxWNd0og1Uivg2ATdC+2/SszOzvjTK+2455UYvw4FbaHdTN9thmI5LSb5dR1hia8WB6UcfCRLLkEYHamRZwpNL7p55W18vslRcDptxGcvri4LzHDItbVuWtNsDL/GURV62xsUlXIi+6xsC9VBd7jbPEMLftIbGyWzxnlUrG7ZEhWR+crdTBDIlJD1uOvVpOK9ai58hGeg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=74ZfQ4KBNireeTAwFryfSd7jXGplj/4wjGCTpb8ZBbU=; b=M7YK7LQQ7ZdXvEGPne4wt++OuO4HJBLhuT5KWB6Oble8N0gio7x7GPIoZEmbHsSZwK4GB1uBUVbvAnkNaWkZD67EZwdsWoE9vla5TWd6JOmMNswSYWDgsdh772T5vYZ3enVvanQhaRcXc8bzH1FkVAv76mowZAXrqaMRV5RUWzrmGukNKkt5TGqXFvXd0Chhx9TbukxzzEK1faYot/4cd/1wAIZ8mlZ2SU9owZD7pxefA+rg8SNo+Cf9vlopAe3NfZXdQj1tjoRKTT/FhCw71JehM/MmXZDaOtuIRfxc1eJQPkwCXxpkVfLQHE6zebyX9QQtQ1TMLiDfoKufQKwSgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=uniovi.es; dmarc=pass action=none header.from=uniovi.es; dkim=pass header.d=uniovi.es; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=unioviedo.onmicrosoft.com; s=selector2-unioviedo-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=74ZfQ4KBNireeTAwFryfSd7jXGplj/4wjGCTpb8ZBbU=; b=xIVd45WQ3QlNeRCMVU/XSXZzPctep/FZZ+PC9DhrbO7Zs5k8aBo4ytVGoZ2Ge9iLe14MV3ysLO8YMy9txvvmVmOwkbh+qkJKIrzDRnPJvuUGK3XtWnhFm4xsjUXt2jmVXV0H572hHjcONdUJ3pPro3sE5w19MjR+kpv60w6nXJA=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=uniovi.es;
Received: from DBBPR08MB6202.eurprd08.prod.outlook.com (2603:10a6:10:209::9) by DB7PR08MB3081.eurprd08.prod.outlook.com (2603:10a6:5:25::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4734.23; Thu, 2 Dec 2021 11:29:15 +0000
Received: from DBBPR08MB6202.eurprd08.prod.outlook.com ([fe80::1434:d823:a6b5:6f50]) by DBBPR08MB6202.eurprd08.prod.outlook.com ([fe80::1434:d823:a6b5:6f50%8]) with mapi id 15.20.4734.024; Thu, 2 Dec 2021 11:29:15 +0000
Content-Type: multipart/alternative; boundary="------------g1LdqgVFOTh9NZcjbFm2Fida"
Message-ID: <821f9e4b-c052-6b46-0a72-7974017bf335@uniovi.es>
Date: Thu, 02 Dec 2021 12:29:13 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.3.2
Cc: garciadan@uniovi.es
To: Göran Selander <goran.selander@ericsson.com>, "ace@ietf.org" <ace@ietf.org>, EMU WG <emu@ietf.org>
References: <163516103436.11405.13911066633297545379@ietfa.amsl.com> <bc792146-39c4-73a3-63e2-7db7acf7aa2f@uniovi.es> <HE1PR0701MB3050A49DC2D32180B2831D6889839@HE1PR0701MB3050.eurprd07.prod.outlook.com> <AM4PR0701MB219545F3A90E17FD18844F13F4629@AM4PR0701MB2195.eurprd07.prod.outlook.com>
From: Dan Garcia Carrillo <garciadan@uniovi.es>
In-Reply-To: <AM4PR0701MB219545F3A90E17FD18844F13F4629@AM4PR0701MB2195.eurprd07.prod.outlook.com>
X-ClientProxiedBy: LO4P123CA0067.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:153::18) To DBBPR08MB6202.eurprd08.prod.outlook.com (2603:10a6:10:209::9)
MIME-Version: 1.0
Received: from [10.138.0.134] (156.35.225.70) by LO4P123CA0067.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:153::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4734.22 via Frontend Transport; Thu, 2 Dec 2021 11:29:14 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6491c5cf-f30d-40cb-5391-08d9b586f85b
X-MS-TrafficTypeDiagnostic: DB7PR08MB3081:
X-Microsoft-Antispam-PRVS: <DB7PR08MB3081AE684185CD784E2C12F3B4699@DB7PR08MB3081.eurprd08.prod.outlook.com>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBBPR08MB6202.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(15650500001)(33964004)(4001150100001)(66476007)(6486002)(2616005)(956004)(107886003)(66946007)(52116002)(31686004)(186003)(110136005)(53546011)(166002)(38100700002)(4326008)(66556008)(786003)(66574015)(8936002)(38350700002)(26005)(5660300002)(86362001)(316002)(508600001)(30864003)(83380400001)(8676002)(36756003)(966005)(2906002)(31696002)(16576012)(43740500002)(45980500001)(559001)(579004); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: uniovi.es
X-MS-Exchange-CrossTenant-Network-Message-Id: 6491c5cf-f30d-40cb-5391-08d9b586f85b
X-MS-Exchange-CrossTenant-AuthSource: DBBPR08MB6202.eurprd08.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 02 Dec 2021 11:29:15.1783 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 05ea74a3-92c5-4c31-978a-925c3c799cd0
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: oX4lz34Z+mBvShL8D3iq8aPBjnBTkmLOhfCTAe6dgLT2iDLKeRK9WbGYopqvudlx3irsimVFnC8lAnAeaTY/sA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR08MB3081
X-MS-Exchange-CrossPremises-AuthSource: DBBPR08MB6202.eurprd08.prod.outlook.com
X-MS-Exchange-CrossPremises-AuthAs: Internal
X-MS-Exchange-CrossPremises-AuthMechanism: 06
X-MS-Exchange-CrossPremises-Mapi-Admin-Submission:
X-MS-Exchange-CrossPremises-MessageSource: StoreDriver
X-MS-Exchange-CrossPremises-BCC:
X-MS-Exchange-CrossPremises-OriginalClientIPAddress: 156.35.225.70
X-MS-Exchange-CrossPremises-TransportTrafficType: Email
X-MS-Exchange-CrossPremises-Antispam-ScanContext: DIR:Originating; SFV:NSPM; SKIP:0;
X-MS-Exchange-CrossPremises-SCL: 1
X-MS-Exchange-CrossPremises-Processed-By-Journaling: Journal Agent
X-OrganizationHeadersPreserved: DB7PR08MB3081.eurprd08.prod.outlook.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/OGVAWe6qe7MMy8BcjQgug2wBI14>
Subject: Re: [Ace] [Emu] New Version Notification for draft-ietf-ace-wg-coap-eap-04.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 02 Dec 2021 11:29:27 -0000

Dear Göran,

Thank you for taking the time to review the document. We found your 
comments very helpful to improve the text.

Please find the responses to your comments inline.

Best Regards,

CoAP-EAP authors.

On 25/11/21 10:09, Göran Selander wrote:
>
> Hello authors of draft-ietf-ace-wg-coap-eap,
>
> Thanks for working with this draft. Here is a mix of nits/editorials 
> and more substantial comments in the order as they appear in the draft.
>
> Abstract
>
> OLD
>
> One of the primer goals is to
>
> NEW
>
> One of the main goals is to
>
  [authors] Fixed.
>
> Section 1.
>
> "EAP methods transported in CoAP MUST generate cryptographic material
>
>    [RFC5247] for this specification. "
>
> The term “cryptographic material” is used multiple times in this 
> document but is not defined. RFC 5247 uses “keying material”, does 
> that match the intended meaning?
>
  [authors] Yes, we agree on this.  We will use “keying material” instead.
>
> Section2.
>
> Figure 1 is perhaps too informative containing endpoints, stacks, what 
> is CoAP, and scope of this document. There is no line/arrow between 
> IoT Device and Controller, presumably because there is too much other 
> information. Section 2 don’t talk about the stack at all.
>
> * Proposal: Make two figures: one with nodes and lines/arrows 
> (“architecture”); another with the stack, which is essentially the 
> same in the two nodes in scope of this document.
>
  [authors] This is a very good point. Thank you for the suggestion. We 
will do that for the next version.

> *  It is confusing that CoAP role allocation is shown in the figure 
> since those only apply to one step of the operation in section 3.2. In 
> all other steps the roles are reversed. Proposal: omit the CoAP roles 
> in the figure, and/or provide an explanation in section text or 
> caption. The section text talking about CoAP client also needs to be 
> modified accordingly.
>
  [authors] This could indeed improve the text, we will simplify this in 
the figure and explain it in the text. In fact, Fig. 2 does not show the 
CoAP role.
>
> * Nit: RFC8323 calls the layer between request/response and reliable 
> transport “message framing”. Perhaps you want to have a common layer 
> renaming the "Messages" layer with “Message /framing/”.
>
   [authors] Yes, that’s right. We will apply this change..

> Section 3.
>
> "It is RECOMMENDED a light EAP method for the case of constrained link 
> and constrained IoT devices."
>
> If this will remain a normative recommendation, then there needs to be 
> a definition (reference) of "light EAP method". Perhaps consider just 
> explain the intention of "light" ("lightweight"?) and remove the 
> normative recommendation?
>
  [authors] Yes, your suggestion makes sense. We will apply it.
>
> ---
>
> OLD
>
> The article [eap-framework], highlights the benefits of the EAP
>
>    framework.
>
> NEW
>
> The benefits of the EAP framework are highlighted in [eap-framework].
>

[authors] Thank you. We will rephrase it that way.

> 3.1
>
> "resource directory"
>
> Provide a reference or at least as an example, like 
> draft-ietf-core-resource-directory,
>
> ---
>
> OLD
>
> Example of this protocols
>
> NEW
>
> Example of such protocols
>
  [authors] Thank you. We will rephrase it that way.
>
> 3.2
>
> Step 0
>
> "The message also includes an URI in the payload of the message to 
> indicate to what resource (e.g. '/a/x') the Controller MUST send the 
> first message with the EAP authentication"
>
> The DoS issues with requiring the Controller to send a message to an 
> unknown URI need to be considered.
>
  [authors] Yes, we will add this to the security considerations section
>
> Step 1
>
> "the Sender ID for OSCORE selected by the Controller"
>
> Is this the Sender ID *of the IoT device* selected by the Controller? 
> In other words, is it the Recipient ID of the Controller selected by 
> the Controller? That would correspond to how OSCORE identifiers are 
> chosen in EDHOC:
>
> https://datatracker.ietf.org/doc/html/draft-ietf-lake-edhoc-12#section-3.3.2
>
> Best not to use the terms "SID" or "RID" unqualified in message fields 
> since they are reversed on the IoT device and Controller. Better use 
> terminology like e.g. RID-I and RID-C for RID of IoT device and 
> Controller, respectively.
>
  [authors] Yes, we understand this might be confusing and we agree with 
you that using RID-I and RID-C is the right way of expressing it to 
avoid this confusion.
>
> Step 2
>
> "the EAP response, the Recipient ID and the selected ciphersuite for 
> OSCORE are in the payload."
>
> Is this the Recipient ID *of the IoT device*? See comment above.
>
  [authors] We believe that with your suggestion this ambiguity will 
disappear.

> ---
>
> OLD
>
> In this step, the IoT device MAY create a OSCORE security context with 
> the Sender ID and Recipient ID.
>
> NEW
>
> In this step, the IoT device MAY create a OSCORE security context with 
> its Sender ID and Recipient ID.
>
[authors] Thank you. We will rephrase it that way.
>
> Step 7
>
> OLD
>
> The reception of the POST message protected with OSCORE using the 
> Sender ID sent in Step 1 is considered by the IoT device as an 
> alternate indication of success ([RFC3748]).
>
> The unqualified "Sender ID" is confusing here. Why does the ID sent in 
> step 1 indicate success to the IoT device? I would expect the ID 
> selected by the IoT device itself and sent in step 2, if used by the 
> Controller to derive the OSCORE security context to protect the 
> message in step 7 would be a stronger indication of success. Proposal 
> (check if this is correct):
>
> NEW
>
> The reception of the POST message protected with an OSCORE security 
> context derived using the Recipient ID of the IoT device sent in Step 
> 2 is considered by the IoT device as an alternate indication of 
> success ([RFC3748]).
>
[authors] Yes, it is correct.  Having qualified the names, the message 
that is sent in the EAP success, would be using the Sender ID of the 
Controller -- Recipient-ID of the IoT device.

> ---
>
> "The communication with the last resource (e.g. '/a/w') from this 
> point MUST be protected with OSCORE except during a new 
> (re)authentication (see Section 3.3)."
>
> I don't understand why there is an exception. OSCORE seems to be 
> applied to communication with the last resource in all cases:
>
> * In the case of new authentication the procedure explained in Section 
> 3.2 applies protection with OSCORE in communication with the last 
> resource.
>
> * In the case of re-authentication, the procedure is explained in 
> Section 3.3 to be "exactly the same" as in Section 3.2.
>
[authors] Yes, we agree. We can remove that part from the sentence to 
avoid any confusion. Nevertheless, after your comment, it would be worth 
stating that if the access to any other resource requires OSCORE 
protection can use the generated OSCORE context. Does it sound reasonable?
>
> Also I find the expression "new (re)authentication" confusing - what 
> is the the difference between "re-authentication" and "new 
> re-authentication"?
>
[authors] Yes, just saying re-authentication is enough. In any case, 
that sentence will be removed as per your suggestion above.

> Section 4.
>
> "  1.  SID: It contains the Identifier for the Sender ID to be used in
>
>        the OSCORE security context.
>
>    2.  RID: It contains the Identifier for the Recipient to be used in
>
>        the OSCORE security context."
>
> Same comment as above to qualify SID and RID: is SID the Sender ID of 
> the IoT device or of the Controller?
>
  [authors] Solved now using qualifies RID-I and RID-C.
>
> Section 5.1
>
> "If the Controller sends a restricted list
>
>    of ciphersuites that is willing to accept, and the ones supported by
>
>    the IoT device are not in that list, the IoT device will respond with
>
>    a '4.00 Bad Request', expressing in the payload the ciphersuites
>
>    supported. "
>
> Make clear (here or in a security consideration) that in case of an 
> error message containing a cipher suite, the exchange of cipher suites 
> between EAP authenticator and EAP peer cannot be verified. For 
> example, a man-in-the-middle could replace cipher suites in either 
> message which would not be noticed if the protocol is ended after step 2.
>
[authors] That’s right. However, after your comments, we believe this 
could be improved. The reason is that by default we can assume that at 
least cipher suite 0. AES-CCM-16-64-128, SHA-256 is implemented in both 
entities. As such, if the controller includes option 0 in the list of 
cipher suites, the controller will not receive a bad request since at 
least the IoT device can select cipher suite 0 and therefore the 
authentication will follow until the end cipher suite negotiation can be 
verified.  We think it is simpler and we can get rid of a bad request. 
Does it sound reasonable?

> Best regards
>
> Göran
>
> *From: *Ace <ace-bounces@ietf.org> on behalf of John Mattsson 
> <john.mattsson=40ericsson.com@dmarc.ietf.org>
> *Date: *Monday, 25 October 2021 at 17:03
> *To: *Dan Garcia Carrillo <garciadan@uniovi.es>, ace@ietf.org 
> <ace@ietf.org>, EMU WG <emu@ietf.org>
> *Subject: *Re: [Ace] [Emu] New Version Notification for 
> draft-ietf-ace-wg-coap-eap-04.txt
>
> Thanks,
>
> I think this is a very useful mechanism and a well written draft. Some 
> quick comments.
>
> - "ciphersuite"
>
> Note that both TLS and EDHOC spells this with space "cipher suite"
>
> - Section 2. I don't understand what "SM" in Figure 1 is an 
> abbrevation for.
>
> - Section 2. "UDP/TCP/Websockets" Why is the Websocket protocol in plural?
>
> - Section 3. "EAP method that exports cryptographic material"
>
> This can probably be reformulated in terms of MSK, EMSK or "Key 
> derivation" which
>
> is the property that RFC 3748 uses.
>
> - "EAP-MD5 cannot be used since it does not export key material"
>
> MD5 should really not be used at all for security resons. Highlighting 
> it like this might
>
> be the idea that it would be ok if EAP-MD5 had the "Key derivation" 
> property.
>
> - "The required key, the Master Session Key (MSK), will be available 
> once the
>
> EAP authentication is successful."
>
>    Does this belong in step 2?
>
> - In Figure 2. I do not think you have to wait until EAP-SUCCES to 
> make MSK available.
>
> The authentication can be successful before EAP-SUCCES.
>
> - In section 3.3. it might be good to state that "Reauthentication" 
> might be needed to rekey MSK/EMSK and to increase protection against 
> key leakage.
>
> (An important mitigation of pervasive monitoring is to force attackers 
> to do dynamic key exfiltration instead of static key exfiltration. 
> Dynamic key exfiltration increases the risk of discovery for the 
> attacker [RFC7624]. While OSCORE will soon be augmented with a 
> rekeying mechanism with forward secrecy, attackers can still get away 
> with doing static key exfiltration. This is similar to TLS 1.3 with 
> KeyUpdate, after leakage of application_traffic_secret_N, a passive 
> attacker can passively eavesdrop on all future application data sent 
> on the connection including application data encrypted with 
> application_traffic_secret_N+1, application_traffic_secret_N+2, etc.)
>
> - "4.  The values from 65000 to 65535 are reserved for experimentation"
>
> what does "The values" refer to? Lifetime? In that case it would fit 
> better under 3.
>
> - In addition to AES-CCM-16-64-128, only ciphersuites only cipher 
> suites with AES-GCM is included. My feeling was that most IoT people 
> are more interested in ChaCha20-Poly1305 than AES-GCM. I don't have a 
> strong personal opinion.
>
> - "which is considered fresh key material"
>
> “considered fresh”? Maybe "uniformally random"?
>
> - With normal use of DTLS, Appendix A violates “The CoAP-EAP operation 
> is intended to be compatible with the use of intermediary entities 
> between the IoT device and the Controller”. This limitation should be 
> clearly stated.
>
> - Probably good if the labels have “CoAP-EAP” in all the labels to 
> guarantee that they do not collide with anything else.
>
> Cheers,
>
> John
>
> *From: *Emu <emu-bounces@ietf.org> on behalf of Dan Garcia Carrillo 
> <garciadan@uniovi.es>
> *Date: *Monday, 25 October 2021 at 13:27
> *To: *ace@ietf.org <ace@ietf.org>, EMU WG <emu@ietf.org>
> *Subject: *Re: [Emu] New Version Notification for 
> draft-ietf-ace-wg-coap-eap-04.txt
>
> Dear ACE and EMU WG,
>
> We have submitted a new version of the draft (draft-ietf-ace-wg-coap-eap)
>
> This version provides information on the different comments, from the
> reviews and interim meetings.
>
> Best Regards.
>
>
> El 10/25/2021 a las 1:23 PM, internet-drafts@ietf.org escribió:
> > A new version of I-D, draft-ietf-ace-wg-coap-eap-04.txt
> > has been successfully submitted by Dan Garcia-Carrillo and posted to the
> > IETF repository.
> >
> > Name:         draft-ietf-ace-wg-coap-eap
> > Revision:     04
> > Title:                EAP-based Authentication Service for CoAP
> > Document date:        2021-10-25
> > Group:                ace
> > Pages:                29
> > URL: https://www.ietf.org/archive/id/draft-ietf-ace-wg-coap-eap-04.txt
> > Status: https://datatracker.ietf.org/doc/draft-ietf-ace-wg-coap-eap/
> > Htmlized: 
> https://datatracker.ietf.org/doc/html/draft-ietf-ace-wg-coap-eap
> > Diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-ace-wg-coap-eap-04
> >
> > Abstract:
> >     This document specifies an authentication service that uses the
> >     Extensible Authentication Protocol (EAP) transported employing
> >     Constrained Application Protocol (CoAP) messages. As such, it
> >     defines an EAP lower layer based on CoAP called CoAP-EAP.  One 
> of the
> >     primer goals is to authenticate a CoAP-enabled IoT device (EAP peer)
> >     that intends to join a security domain managed by a Controller (EAP
> >     authenticator).  Secondly, it allows deriving key material to 
> protect
> >     CoAP messages exchanged between them based on Object Security for
> >     Constrained RESTful Environments (OSCORE), enabling the 
> establishment
> >     of a security association between them.
> >
> >
> >
> >
> > The IETF Secretariat
> >
> >
>
> _______________________________________________
> Emu mailing list
> Emu@ietf.org
> https://www.ietf.org/mailman/listinfo/emu
>