[core] Re: Mohamed Boucadair's No Objection on draft-ietf-core-oscore-groupcomm-27: (with COMMENT)
Marco Tiloca <marco.tiloca@ri.se> Fri, 12 December 2025 18:27 UTC
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@mail2.ietf.org
Delivered-To: core@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id F31C799C675D; Fri, 12 Dec 2025 10:27:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.996
X-Spam-Level:
X-Spam-Status: No, score=-1.996 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=ri.se
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U0PXdZyoM4zd; Fri, 12 Dec 2025 10:27:36 -0800 (PST)
Received: from GV3P280CU013.outbound.protection.outlook.com (mail-swedencentralazon11010027.outbound.protection.outlook.com [52.101.75.27]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 6359099C6752; Fri, 12 Dec 2025 10:27:36 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wdAEI5Y/iT02ktyN1fmA6Ya4hSzGx2bYcfwYLRAxrGY0Ew+stIdLLT6yxsqhj0a5CaA+ZyJcFKBZYrJSbjMEg88FdwkNtAbt85J/OnjgNEjzIVAI9F+8zqDcBO1MkzCLApyOc3vSypvhGtFvEz1FIW4MMcuDUWK+BAzlXqfe3/ZDYF6YedBiOXqfTQHsSgYTuYEnvDF44/w7yAjYKB+ujHlwkI8QercArm6fmyp5MuFqdsPBrGIP8o70VHsm0BvJ0dU/ZcySb5ipkx/prfMTznWbMHgmMlJj1VwdmxurMHBf/xlzHalKv/43Pf01lU2ZfBWbPkeASfYZa912zwJA/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=robQocK803RanluvcJwqlrIh05KHNAj9I/FArqBjIQg=; b=SPD4KexAoPnuJia6JyRhX7cwpyT26sr7Axz4O0JxAXjknCpuZN/Xni5JxHYfFGFhg1Pa6cjIITR/uVhk/Zu0s/L8DYa+H0iMylgCB83rQLtczirGt+ziZ5TaGWkZ+D3YC1CiVScaUP54IF5Y5eztTvVK+2WBY9ZNz0bpEUD2iYUI459P5tztY5wvdQjUB8XOyYUA1+EPjAUdq/ou48mJv+xmZ3U7BhMMNSDR7M9+kyhpPaQ0I1OOY2cvtfFo53zT/rmJ6Ot90q4eZPE/HYLl0uhDTzaozdfWeTJsHyqfwBXlyHgCg8Xcfx4WIV4qSAOW8v7cKAV0SGOx0Hq/BpnQhQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=robQocK803RanluvcJwqlrIh05KHNAj9I/FArqBjIQg=; b=Uux3vp52KHWKxDAi1db265aGjRHgpDqvZGIjk4OBu0INVcAUNYiYGKDj4RBkL8d1h84iZa6YCLFwTO2GRUCiVf6BM2cgwOMC3o99c1rDjeSziuZ/mVQ9jmrZ/98yT7nszuIt4KC/9qWKJDWwFxjK/aYpLUaMVF4H8TnG6jZQFwhFmlUID59Asv0FyxwBw/bdXuYapLyog+2IkUmYpZk+avh/MKNhLpTMxyuUeFe2BYVtdHapzaZLkjN+qk4GoHl9Rp6zsAnEQ4yGXDKTzT/bGONaTtK++yz8MZCfNGEkmHOsGXUD6l8gdp++X6e758k+dXQgel4Gwj22S5dblH0rug==
Received: from GV3P280MB0450.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:11::7) by GV3P280MB0436.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:13::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9412.11; Fri, 12 Dec 2025 18:27:24 +0000
Received: from GV3P280MB0450.SWEP280.PROD.OUTLOOK.COM ([fe80::660a:b243:998d:77df]) by GV3P280MB0450.SWEP280.PROD.OUTLOOK.COM ([fe80::660a:b243:998d:77df%6]) with mapi id 15.20.9412.011; Fri, 12 Dec 2025 18:27:24 +0000
From: Marco Tiloca <marco.tiloca@ri.se>
To: The IESG <iesg@ietf.org>, Mohamed Boucadair <mohamed.boucadair@orange.com>
Thread-Topic: Mohamed Boucadair's No Objection on draft-ietf-core-oscore-groupcomm-27: (with COMMENT)
Thread-Index: AQHcN5NHOf25uaLej0C4oD0o4jQ7D7UeuG0o
Date: Fri, 12 Dec 2025 18:27:24 +0000
Message-ID: <GV3P280MB0450710E454DDA69EE41B6F299AEA@GV3P280MB0450.SWEP280.PROD.OUTLOOK.COM>
References: <175984585755.4038373.14177717915958278962@dt-datatracker-6c6cdf7f94-h6rnn>
In-Reply-To: <175984585755.4038373.14177717915958278962@dt-datatracker-6c6cdf7f94-h6rnn>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_680afd86-dcf7-4483-b9eb-5af1dcd104e1_Enabled=True;MSIP_Label_680afd86-dcf7-4483-b9eb-5af1dcd104e1_SiteId=5a9809cf-0bcb-413a-838a-09ecc40cc9e8;MSIP_Label_680afd86-dcf7-4483-b9eb-5af1dcd104e1_SetDate=2025-12-12T18:27:23.900Z;MSIP_Label_680afd86-dcf7-4483-b9eb-5af1dcd104e1_Name=K2 Intern;MSIP_Label_680afd86-dcf7-4483-b9eb-5af1dcd104e1_ContentBits=1;MSIP_Label_680afd86-dcf7-4483-b9eb-5af1dcd104e1_Method=Standard;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: GV3P280MB0450:EE_|GV3P280MB0436:EE_
x-ms-office365-filtering-correlation-id: e7d8f5e1-0893-434f-0dd5-08de39ac18cd
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|19092799006|1800799024|376014|366016|13003099007|38070700021|8096899003|7053199007;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GV3P280MB0450.SWEP280.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(19092799006)(1800799024)(376014)(366016)(13003099007)(38070700021)(8096899003)(7053199007);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_GV3P280MB0450710E454DDA69EE41B6F299AEAGV3P280MB0450SWEP_"
MIME-Version: 1.0
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: GV3P280MB0450.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: e7d8f5e1-0893-434f-0dd5-08de39ac18cd
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Dec 2025 18:27:24.6019 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WS56DEc5wX+d+gG0rPdngGE7Vbt0uhwVr7YyzdQ9Rktn8bcPpfll3AgvYkqz6lDuTRtyr6uj2a5kVvCZStESew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV3P280MB0436
Message-ID-Hash: HRNKIRFZX3EGPAFEOO2PXVTLXCOU6BAN
X-Message-ID-Hash: HRNKIRFZX3EGPAFEOO2PXVTLXCOU6BAN
X-MailFrom: marco.tiloca@ri.se
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-core.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "draft-ietf-core-oscore-groupcomm@ietf.org" <draft-ietf-core-oscore-groupcomm@ietf.org>, "core-chairs@ietf.org" <core-chairs@ietf.org>, "core@ietf.org" <core@ietf.org>, "christian@amsuess.com" <christian@amsuess.com>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [core] Re: Mohamed Boucadair's No Objection on draft-ietf-core-oscore-groupcomm-27: (with COMMENT)
List-Id: "Constrained RESTful Environments (CoRE) Working Group list" <core.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/HuGG9PS0k13F1yA7L8r1xSKuYak>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Owner: <mailto:core-owner@ietf.org>
List-Post: <mailto:core@ietf.org>
List-Subscribe: <mailto:core-join@ietf.org>
List-Unsubscribe: <mailto:core-leave@ietf.org>
Hello Mohamed, Thanks a lot for your review! Please find in line below our detailed replies to your comments. A GitHub PR where we have addressed your comments is available at [PR]. Unless any concern is raised, we plan to soon merge this PR (and the other ones related to other received reviews) and to submit the result as version -28 of the document. Thanks, /Marco [PR] https://github.com/core-wg/oscore-groupcomm/pull/122 ________________________________ From: Mohamed Boucadair via Datatracker <noreply@ietf.org> Sent: Tuesday, October 7, 2025 4:04 PM To: The IESG <iesg@ietf.org> Cc: draft-ietf-core-oscore-groupcomm@ietf.org <draft-ietf-core-oscore-groupcomm@ietf.org>; core-chairs@ietf.org <core-chairs@ietf.org>; core@ietf.org <core@ietf.org>; christian@amsuess.com <christian@amsuess.com>; christian@amsuess.com <christian@amsuess.com> Subject: Mohamed Boucadair's No Objection on draft-ietf-core-oscore-groupcomm-27: (with COMMENT) Mohamed Boucadair has entered the following ballot position for draft-ietf-core-oscore-groupcomm-27: No Objection When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.) Please refer to https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fabout%2Fgroups%2Fiesg%2Fstatements%2Fhandling-ballot-positions%2F&data=05%7C02%7Cmarco.tiloca%40ri.se%7Ccb9508054ed14fcef77a08de05aa6879%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638954426619398033%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=1FkxhoZAcpXWT2ttIsAnJ6I7bRab3NTIhGUKMzJb8CE%3D&reserved=0<https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/> for more information about how to handle DISCUSS and COMMENT positions. The document, along with other ballot positions, can be found here: https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-core-oscore-groupcomm%2F&data=05%7C02%7Cmarco.tiloca%40ri.se%7Ccb9508054ed14fcef77a08de05aa6879%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638954426619423444%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=uTm9wYR3yd20VE%2FUUbtXjoIbIl2ZdZiyGaLRbpb0o8s%3D&reserved=0<https://datatracker.ietf.org/doc/draft-ietf-core-oscore-groupcomm/> ---------------------------------------------------------------------- COMMENT: ---------------------------------------------------------------------- Hi Marco, Göran, Francesca, John, and Rikard, Thanks for the effort put into this spec. I appreciate the discussion in Section 12, in particular. Please find below some comments: # Re-keying & Observe CURRENT: * Long exchange: an exchange of messages associated with a request that is a group request and/or an Observe request [RFC7641]. I wonder whether there any impact of key change on installed observed. ==>MT By design, there is no impact, except for a very specific case that is detailed below. As to the general case, Section 3.4 "Additional Authenticated Data" explains that the new element 'request_kid_context' in the aad_array achieves precisely the seamless and safe preservation of active long exchanges (including observations), also after a group rekeying has occurred. As to the particular case, a group member might be evicted from the group precisely to prevent by construction that any long exchanges can remain active unsafely. This concerns a particular, delicate situation that can arise during the lifetime of a group and throughout instances of group rekeying, if the Group Manager is configured to reassign Gid values as defined in Section 12.2.1.1.1. In such a case, in the interest of safely preserving long exchanges, the Group Manager has to additionally store the "Birth Gid" of each group member, i.e., the Gid that was provided to that member at its latest group (re-)joining. When rekeying the group and thereby establishing a new Gid value, the Group Manager must determine whether there are "elder" group members whose associated "Birth Gid" is equal to the new Gid to establish. If that is the case, then the group rekeying has to effectively evict from the group also such group members. Consequently, as stated at the end of Section 12.2.1.1.1: * Excluded elder members could eventually re-join the group, thus terminating any of their ongoing long exchanges (including observations). * It is ensured by construction that there cannot be long exchanges that are active unsafely. That is, it is ensured that no client can have with the same server two ongoing long exchanges, such that the two respective requests were protected using the same Partial IV, Gid, and Sender ID. <== # To whom? CURRENT: How the Security Context is established by the group members is out of scope for this document, but if there is more than one Security Context applicable to a message, then the endpoints MUST be able to ^^^^^^^^^^ tell which Security Context was latest established. ^^^^^^ ==>MT We have rephrased as below, to have the intended meaning explicit. OLD > ... then the endpoints MUST be able to tell which Security Context was latest established. NEW (emphasis mine) > ... then the endpoints MUST be able to **determine** which Security Context was latest established. <== # Capability CURRENT: An endpoint of the group may use the group mode (see Section 7), the pairwise mode (see Section 8), or both, depending on the modes it supports and on the parameters of the Security Context. Is there a need to know in advance with a remote endpoint supports one or all these modes? Does that have impact on how contexts are established? ==>MT The short, practical answer is "no" to both questions. There is intentionally a separation between, on one hand, what modes are "enabled to be used" in the group according to the decision of the Group Manager, and, on the other hand, what modes an individual group member supports. The establishment of the Security Context is largely based on the information and parameters obtained from the Group Manager. That's sufficient to indicate whether one mode, or the other mode, or both are "enabled to be used" in the group. Consequently: * A group member supporting a mode will be effectively able to use that mode, if that mode is enabled to be used in the group. * A group member (irrespective of what it supports) knows about the mode(s) that are enabled to be used in the group, while it does not know what another group member supports until communicating with that other group member. If the use of the pairwise mode is not enabled in the group and/or a group member does not support the pairwise mode, then that group member does not install: * Pairwise Sender Keys for the other endpoints, in its own Sender Context. * The Pairwise Recipient Key for any other endpoint, in its own Recipient Context corresponding to that other endpoint. The above is highlighted in Figure 1 of Section 2. Similarly, other parameters in the Common Context are not relevant to install if they pertain to a mode that is not enabled to be used in the group and/or that the endpoint does not support. <== # How the limit is know? Can that be retrieved from the system and exposed to the app? CURRENT: An endpoint may admit a maximum number of Recipient Contexts for a same Security Context, e.g., due to memory limitations. After reaching that limit, the endpoint has to delete a current Recipient Context to install a new one (see Section 2.6.1.2). It is up to the application to define policies for Recipient Contexts to delete. ==>MT It's not that the maximum number can be "retrieved from the system and exposed to the app". Like stated later in Section 2.6.1.2, "Group OSCORE in itself does not establish a maximum number of Recipient Contexts". In fact, the application is also meant to define that maximum number, together with the policies about deleting Recipient Contexts. We have rephrased and improved the last sentence as below: OLD > It is up to the application to define policies for Recipient Contexts to delete. NEW (emphasis mine) It is up to the application to define **the maximum number of Recipient Contexts for a same Security Context as well as policies for deleting** Recipient Contexts. <== # Tracking/Logging CURRENT: The Security Context may contain a large and variable number of Recipient Contexts. While Group OSCORE in itself does not establish a maximum number of Recipient Contexts, there are circumstances by which implementations might choose to discard Recipient Contexts or have to do so in accordance with enforced application policies. Such circumstances include the need to reclaim memory or other resources on the node hosting the endpoint, for example because the predefined maximum number of Recipient Contexts has been reached in the Security Context (see Section 2.2). How these discarded contexts are tracked? Are there some king of alarm/notification to warn this? ==>MT They are not tracked and Group OSCORE in itself does not need to specifically track/log their deletion. Group OSCORE in itself only needs to switch into initializing the Replay Window of new Recipient Contexts as invalid, if those are created after the first deliberate deletion of a Recipient Context (see third paragraph in Section 2.6.1.2). If an endpoint N_1 deletes a Recipient Context associated with another endpoint N_2, then N1 will be later able to create a new Recipient Context associated with N_2, when receiving a message from N_2 (just like it did the first time). Since the application might have some interest in logging these deletions, we have extended the text as follows. NEW (emphasis mine) > Such circumstances include ..., for example because the predefined maximum number of Recipient Contexts has been reached in the Security Context (see Section 2.2). **Implementations can provide means for the application to gain knowledge about the deliberate deletion of Recipient Contexts, e.g., through notifications sent to the application and/or logs made available to the application.** <== # Is there a reason what the Group Manager may not be informed? Shouldn’t such event be logged locally, btw? Shouldn’t the manager be contacted prior to exhaustion and not wait for full exhaustion? CURRENT: Upon exhausting the Sender Sequence Number space, the endpoint MUST NOT use this Security Context to protect further messages including a Partial IV. When approaching the exhaustion of the Sender Sequence Number space, the endpoint SHOULD inform the Group Manager, retrieve new Security Context parameters from the Group Manager (see Section 2.6.3), and use them to derive a new Sender Context (see Section 2.2). ==>MT Addressing the three questions in order: **1.** Is there a reason what the Group Manager may not be informed? There is no particular reason to inform the Group Manager specifically about that. In principle, the endpoint in question can also live with the situation safe and well, as long as it is not going to consume new values of its Sender Sequence Number. This is the case, e.g., if the endpoint plans to not send any message at all for a long while, or only to send first-responses to a given request (which do not need to consume a Sender Sequence Number). In order to start over with new keying material and Sender Sequence Number 0, indeed an interaction with the Group Manager is required. That interaction is specifically a request to re-join the group or for only obtaining a new Sender ID, and it abstracts away from the particular underlying reason. **2.** Shouldn't such event be logged locally, btw? We don't see any particular reason or advantage in doing that. **3.** Shouldn't the manager be contacted prior to exhaustion and not wait for full exhaustion? Indeed. This is what the fourth paragraph in the same Section 2.6.2 already says after the quoted text above, i.e.: > It is RECOMMENDED that the endpoint takes this course of action with some margin, i.e., well before exhausting the Sender Sequence Number space, in order to avoid a period of inability to protect messages including a Partial IV. <== # Not new behavior: cite as quote OLD: As per [RFC7252][I-D.ietf-core-groupcomm-bis], group requests sent over multicast MUST be Non-confirmable, and thus are not retransmitted by the CoAP messaging layer. NEW: As per [RFC7252][I-D.ietf-core-groupcomm-bis], “group requests sent over multicast MUST be Non-confirmable”, and thus are not retransmitted by the CoAP messaging layer. And OLD: According to Section 5.2.3 of [RFC7252], responses to Non-confirmable group requests SHOULD also be Non-confirmable, NEW: According to Section 5.2.3 of [RFC7252], “responses to Non-confirmable group requests SHOULD also be Non-confirmable”, ==>MT Let's take the two suggestions separately. **On the first suggestion**, there is no single, common sentence that we can quote verbatim from those two documents. The closest sentences that they have are: In RFC 7252 * Section 8.1, "Such multicast requests MUST be Non-confirmable." In draft-ietf-core-groupcomm-bis * Section 3.1.1, "All CoAP requests that are sent via IP multicast MUST be Non-confirmable (NON)". * Section 3.6, "An IP multicast request MUST be Non-confirmable (Section 8.1 of [RFC7252])." Instead, we have rephrased as below to simply state a fact, without restating through normative language, i.e.: NEW (emphasis mine) > As per [RFC7252][I-D.ietf-core-groupcomm-bis], group requests sent over multicast **are always** Non-confirmable, and thus are not retransmitted by the CoAP messaging layer. **On the second suggestion**, that works but we have to use (part of) the sentence from RFC 7252 verbatim, i.e.: > If the request message is Non-confirmable, then the response SHOULD be returned in a Non-confirmable message as well. However, an endpoint MUST be prepared to receive a Non-confirmable response (preceded or followed by an Empty Acknowledgement message) in reply to a Confirmable request, or a Confirmable response in reply to a Non-confirmable request. So we have extended our text as below. OLD > According to Section 5.2.3 of [RFC7252], responses to Non-confirmable group requests SHOULD also be Non-confirmable, but endpoints MUST be prepared to receive Confirmable responses in reply to a Non-confirmable group request. NEW (emphasis mine) > According to Section 5.2.3 of [RFC7252], **"[i]f the request message is Non-confirmable, then the response SHOULD be returned in a Non-confirmable message as well. However, an endpoint MUST be prepared to receive (...) a Confirmable response in reply to a Non-confirmable request."** <== Cheers, Med
- [core] Mohamed Boucadair's No Objection on draft-… Mohamed Boucadair via Datatracker
- [core] Re: Mohamed Boucadair's No Objection on dr… Marco Tiloca
- [core] Re: Mohamed Boucadair's No Objection on dr… mohamed.boucadair