[core] I-D Action: draft-ietf-core-oscore-key-limits-02.txt
internet-drafts@ietf.org Wed, 10 January 2024 18:44 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: core@ietf.org
Delivered-To: core@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BA8CC14CEFF; Wed, 10 Jan 2024 10:44:26 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: core@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.2.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: core@ietf.org
Message-ID: <170491226622.33073.8839934999310383265@ietfa.amsl.com>
Date: Wed, 10 Jan 2024 10:44:26 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/Ur4nyIp0sSZvVMJNWXHUb7m-QAY>
Subject: [core] I-D Action: draft-ietf-core-oscore-key-limits-02.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 10 Jan 2024 18:44:26 -0000
Internet-Draft draft-ietf-core-oscore-key-limits-02.txt is now available. It
is a work item of the Constrained RESTful Environments (CORE) WG of the IETF.
Title: Key Usage Limits for OSCORE
Authors: Rikard Höglund
Marco Tiloca
Name: draft-ietf-core-oscore-key-limits-02.txt
Pages: 14
Dates: 2024-01-10
Abstract:
Object Security for Constrained RESTful Environments (OSCORE) uses
AEAD algorithms to ensure confidentiality and integrity of exchanged
messages. Due to known issues allowing forgery attacks against AEAD
algorithms, limits should be followed on the number of times a
specific key is used for encryption or decryption. Among other
reasons, approaching key usage limits requires updating the OSCORE
keying material before communications can securely continue. This
document defines how two OSCORE peers can follow these key usage
limits and what steps they should take to preserve the security of
their communications.
The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-core-oscore-key-limits/
There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-core-oscore-key-limits-02.html
A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-core-oscore-key-limits-02
Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts
- [core] I-D Action: draft-ietf-core-oscore-key-lim… internet-drafts