[core] I-D Action: draft-ietf-core-oscore-key-limits-00.txt
internet-drafts@ietf.org Mon, 13 March 2023 20:29 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 7922BC14F74E; Mon, 13 Mar 2023 13:29:11 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 9.14.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <167873935148.12048.1368699342392933340@ietfa.amsl.com>
Date: Mon, 13 Mar 2023 13:29:11 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/32Od9Sr7ycfSqw49fswyrbShZ0w>
Subject: [core] I-D Action: draft-ietf-core-oscore-key-limits-00.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Mar 2023 20:29:11 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This Internet-Draft is a work item of the Constrained RESTful Environments (CORE) WG of the IETF. Title : Key Usage Limits for OSCORE Authors : Rikard Höglund Marco Tiloca Filename : draft-ietf-core-oscore-key-limits-00.txt Pages : 12 Date : 2023-03-13 Abstract: Object Security for Constrained RESTful Environments (OSCORE) uses AEAD algorithms to ensure confidentiality and integrity of exchanged messages. Due to known issues allowing forgery attacks against AEAD algorithms, limits should be followed on the number of times a specific key is used for encryption or decryption. Among other reasons, approaching key usage limits requires updating the OSCORE keying material before communications can securely continue. This document defines how two OSCORE peers can follow these key usage limits and what steps they should take to preserve the security of their communications. The IETF datatracker status page for this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-core-oscore-key-limits/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-ietf-core-oscore-key-limits-00.html Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
- [core] I-D Action: draft-ietf-core-oscore-key-lim… internet-drafts