[core] I-D Action: draft-ietf-core-oscore-key-limits-01.txt

internet-drafts@ietf.org Mon, 10 July 2023 15:40 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 82425C13AE2A; Mon, 10 Jul 2023 08:40:36 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 11.4.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <168900363649.33372.2120516553813364282@ietfa.amsl.com>
Date: Mon, 10 Jul 2023 08:40:36 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/-dP4DJta4-egQwMjerFCN30e0w0>
Subject: [core] I-D Action: draft-ietf-core-oscore-key-limits-01.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 10 Jul 2023 15:40:36 -0000

A New Internet-Draft is available from the on-line Internet-Drafts
directories. This Internet-Draft is a work item of the Constrained RESTful
Environments (CORE) WG of the IETF.

   Title           : Key Usage Limits for OSCORE
   Authors         : Rikard Höglund
                     Marco Tiloca
   Filename        : draft-ietf-core-oscore-key-limits-01.txt
   Pages           : 14
   Date            : 2023-07-10

Abstract:
   Object Security for Constrained RESTful Environments (OSCORE) uses
   AEAD algorithms to ensure confidentiality and integrity of exchanged
   messages.  Due to known issues allowing forgery attacks against AEAD
   algorithms, limits should be followed on the number of times a
   specific key is used for encryption or decryption.  Among other
   reasons, approaching key usage limits requires updating the OSCORE
   keying material before communications can securely continue.  This
   document defines how two OSCORE peers can follow these key usage
   limits and what steps they should take to preserve the security of
   their communications.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-oscore-key-limits/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-oscore-key-limits-01.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-core-oscore-key-limits-01

Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts