Re: [core] Review of draft-ietf-core-oscore-groupcomm-05

Marco Tiloca <marco.tiloca@ri.se> Tue, 05 November 2019 15:03 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4155F12001A; Tue, 5 Nov 2019 07:03:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=risecloud.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RS5xi69t8EpS; Tue, 5 Nov 2019 07:03:11 -0800 (PST)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03on0618.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe09::618]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C917C1200C3; Tue, 5 Nov 2019 07:03:10 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HB07hVNZ4vuty6FkPFHqTtzcyRyS+PmaUUx2CdFALIV5RTicbWGudpKA8sQWN9aX/DWbweJ94tOxcmIdfK7XUdafAehMBL8WpHllmTTzJun9byx/jx459dfemI9uXdi//o2c0E/ENyASqhUt1Tte2BwuP9cO2d5jNxt/UafxBZqASQD/Y7l6n1eDfGslaWu9W+yvUCh1f75KGrOnkx0iX2kIobDlc0kuH/sDcW5QSG4jEcCEVjWOb/LPLeT5hP+1CC8Y5K97c06rPkyBjwokGXiNvcU6fCM3XI58BDZEIUyq47LRnSDky7t++DUveslvaRLYmGSISJQmUsI2AhIdhQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bZLxLGmmLKsMIK04veUbre6kFttPRD5CS/hvWVnFXG0=; b=m+KeHRmTosO2rkTxWHBJHvsXGvzhveWV80R2j98OsJT7T2NO3j3cc1AKfyWtHPmD77K2Ri33OgwAkzdCVMabvsaDBLLtm2GRgCNIrsH7t/dhWllpMTml0QYVeFMwXeVDCMapHhnJ3K1URoUh28iiKPNtMWOmH0VXW/cYlspxi1rjkjaW5t7ngQqqACV93d51bO2uRWKMwMPybEyjIO1KnRMVgYcgccnfqxdAtoqeZ4JUI/PYYLnYANqJE8dvi+7M5BrC2Zi9j9H8EK1gJf1dxKGeeNVDr9yGd08QakFFaIntlZo+m+xWth7On17Y/ZlaBxGaJqzIscmSn011VPulVg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 194.218.146.197) smtp.rcpttodomain=ietf.org smtp.mailfrom=ri.se; dmarc=pass (p=none sp=none pct=100) action=none header.from=ri.se; dkim=none (message not signed); arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=RISEcloud.onmicrosoft.com; s=selector1-RISEcloud-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bZLxLGmmLKsMIK04veUbre6kFttPRD5CS/hvWVnFXG0=; b=HtgdwBHjrL6+jOSAdLnuizFE7qG/0VxvPICrTwykI+WSH2maC50NqKoHaP9zr/HRoSkoERb9cKYN3ZMd0szP2ayWuqn7TAQeUhxdE57eZmzn4RAwsgLqYV8NS+tJJu2s3YJOAKaw2GSB9FCskPnzG3RyHjho1EsQiQ/lMKf0C5U=
Received: from AM5P189CA0014.EURP189.PROD.OUTLOOK.COM (2603:10a6:206:15::27) by AM5P189MB0355.EURP189.PROD.OUTLOOK.COM (2603:10a6:206:22::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2408.24; Tue, 5 Nov 2019 15:03:08 +0000
Received: from HE1EUR02FT029.eop-EUR02.prod.protection.outlook.com (2a01:111:f400:7e05::204) by AM5P189CA0014.outlook.office365.com (2603:10a6:206:15::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.2430.20 via Frontend Transport; Tue, 5 Nov 2019 15:03:08 +0000
Authentication-Results: spf=pass (sender IP is 194.218.146.197) smtp.mailfrom=ri.se; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=pass action=none header.from=ri.se;
Received-SPF: Pass (protection.outlook.com: domain of ri.se designates 194.218.146.197 as permitted sender) receiver=protection.outlook.com; client-ip=194.218.146.197; helo=mail.ri.se;
Received: from mail.ri.se (194.218.146.197) by HE1EUR02FT029.mail.protection.outlook.com (10.152.10.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.20.2387.20 via Frontend Transport; Tue, 5 Nov 2019 15:03:07 +0000
Received: from [10.8.3.8] (10.116.0.226) by sp-mail-2.sp.se (10.100.0.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1779.2; Tue, 5 Nov 2019 16:03:06 +0100
To: Ludwig Seitz <ludwig.seitz@ri.se>, draft-ietf-core-oscore-groupcomm@ietf.org
CC: core <core@ietf.org>
References: <523312fb-74ff-2845-7371-1a33202ae4af@ri.se>
From: Marco Tiloca <marco.tiloca@ri.se>
Openpgp: preference=signencrypt
Autocrypt: addr=marco.tiloca@ri.se; prefer-encrypt=mutual; keydata= mQENBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLNR8ZhDz6Z aRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD+QBdf29pQadrVZAt 0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGNdsY6kPSVzMRyedX7ArLXyF+0 Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZXkLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+ NrSetJlljT0QOXrXMGh98GLfNnLAl6gJryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEB AAG0Nk1hcmNvIFRpbG9jYSAobWFyY28udGlsb2NhQHJpLnNlKSA8bWFyY28udGlsb2NhQHJp LnNlPokBNwQTAQgAIQUCWkAnkAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDuJmS0 DljaQwEvCACJKPJIPGH0oGnLJY4G1I2DgNiyVKt1H4kkc/eT8Bz9OSbAxgZo3Jky382e4Dba ayWrQRFen0aLSFuzbU4BX4O/YRSaIqUO3KwUNO1iTC65OHz0XirGohPUOsc0SEMtpm+4zfYG 7G8p35MK0h9gpwgGMG0j0mZX4RDjuywC88i1VxCwMWGaZRlUrPXkC3nqDDRcPtuEGpncWhAV Qt2ZqeyITv9KCUmDntmXLPe6vEXtOfI9Z3HeqeI8OkGwXpotVobgLa/mVmFj6EALDzj7HC2u tfgxECBJddmcDInrvGgTkZtXEVbyLQuiK20lJmYnmPWN8DXaVVaQ4XP/lXUrzoEzuQENBFSN eRUBCACWmp+k6LkY4/ey7eA7umYVc22iyVqAEXmywDYzEjewYwRcjTrH/Nx1EqwjIDuW+BBE oMLRZOHCgmjo6HRmWIutcYVCt9ieokultkor9BBoQVPiI+Tp51Op02ifkGcrEQNZi7q3fmOt hFZwZ6NJnUbA2bycaKZ8oClvDCQj6AjEydBPnS73UaEoDsqsGVjZwChfOMg5OyFm90QjpIw8 m0uDVcCzKKfxq3T/z7tyRgucIUe84EzBuuJBESEjK/hF0nR2LDh1ShD29FWrFZSNVVCVu1UY ZLAayf8oKKHHpM+whfjEYO4XsDpV4zQ15A+D15HRiHR6Adf4PDtPM1DCwggjABEBAAGJAR8E GAECAAkFAlSNeRUCGwwACgkQ7iZktA5Y2kPGEwf/WNjTy3z74vLmHycVsFXXoQ8W1+858mRy Ad0a8JYzY3xB7CVtqI3Hy894Qcw4H6G799A1OL9B1EeA8Yj3aOz0NbUyf5GW+iotr3h8+KIC OYZ34/BQaOLzdvDNmRoGHn+NeTzhF7eSeiPKi2jex+NVodhjOVGXw8EhYGkeZLvynHEboiLM 4TbyPbVR9HsdVqKGVTDxKSE3namo3kvtY6syRFIiUz5WzJfYAuqbt6m3TxDEb8sA9pzaLuhm fnJRc12H5NVZEZmE/EkJFTlkP4wnZyOSf/r2/Vd0iHauBwv57cpY6HFFMe7rvK4s7ME5zctO Ely5C6NCu1ZaNtdUuqDSPA==
Message-ID: <510cd1d3-fcde-d787-5049-f497df91f8d4@ri.se>
Date: Tue, 05 Nov 2019 16:03:00 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0
MIME-Version: 1.0
In-Reply-To: <523312fb-74ff-2845-7371-1a33202ae4af@ri.se>
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="xeqBV8tUPfKcjuTZJbR7yvdf72BI4UXF5"
X-Originating-IP: [10.116.0.226]
X-ClientProxiedBy: sp-mail-3.sp.se (10.100.0.163) To sp-mail-2.sp.se (10.100.0.162)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:194.218.146.197; IPV:NLI; CTRY:SE; EFV:NLI; SFV:NSPM; SFS:(10009020)(4636009)(136003)(346002)(39860400002)(376002)(396003)(52314003)(199004)(189003)(16526019)(6246003)(186003)(568964002)(26005)(106002)(3846002)(966005)(4326008)(81166006)(81156014)(6116002)(58126008)(110136005)(33964004)(6666004)(356004)(22746008)(66574012)(386003)(21480400003)(235185007)(5024004)(14444005)(36756003)(71190400001)(5660300002)(70586007)(70206006)(2906002)(8936002)(6306002)(65956001)(86362001)(76176011)(450100002)(30864003)(22756006)(316002)(16576012)(229853002)(44832011)(16586007)(478600001)(126002)(486006)(476003)(2616005)(40036005)(8676002)(31696002)(336012)(11346002)(446003)(7736002)(31686004)(53546011)(65806001)(305945005); DIR:OUT; SFP:1101; SCL:1; SRVR:AM5P189MB0355; H:mail.ri.se; FPR:; SPF:Pass; LANG:en; PTR:InfoDomainNonexistent; A:1; MX:1;
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 8b3a174f-3e7d-4c91-aed4-08d762014481
X-MS-TrafficTypeDiagnostic: AM5P189MB0355:
X-Microsoft-Antispam-PRVS: <AM5P189MB03550B17C546CCB7B766239B997E0@AM5P189MB0355.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-Forefront-PRVS: 0212BDE3BE
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: d/Su64s5eiC2Pgn1/11jb+CkrWmW1xT/0g4P/XM95taPHMpo2VYm31P0EOSomq31NZq7UaJcwmIL8BhdrhwbUPtKgKWOYqW6+D+T+3cqcZbfszoXdel3I7+l8sAvS/s3HPLRfDhS8zi2RvHaLYDneLFdRk65p72QBTIVdBGUGZugdCFTsyKS7HEFqrz0NuNB3euV57o27Rxf4KdehNDRqg4IDdbl0Ig+ewbEgG2l3QGSGbxqcM9Ojo5PJlPKSuFDK/ciHXBZcUsMOp9aR4BXgQikcWO/2Rg9IE/+RsRmiTkOOo/eCSg0valgnMeXs95om5Hw6UzQ4Z/7zvhS5fXeBY9ArYKRiKwbAnGXya8j1e8OLepgI3nQRpiBAKvBgT/HFZfg9KvMPAIc0XGUk5tQUTw3W5rWzwMzmw/YoDVt5kKUqNT02VkHphBLTV1+TEVX
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Nov 2019 15:03:07.9322 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 8b3a174f-3e7d-4c91-aed4-08d762014481
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5a9809cf-0bcb-413a-838a-09ecc40cc9e8; Ip=[194.218.146.197]; Helo=[mail.ri.se]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5P189MB0355
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/hTSGuBA_AIhxwRVvOBKYgLxC8PU>
Subject: Re: [core] Review of draft-ietf-core-oscore-groupcomm-05
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Nov 2019 15:03:16 -0000

Hi Ludwig,

Thank you very much for your review! We have addressed your points in
the recently submitted v -06.

https://tools.ietf.org/html/draft-ietf-core-oscore-groupcomm-06

Please, see our replies inline below.

Best,
/Marco

On 7/24/19 2:13 PM, Ludwig Seitz wrote:
> Hello Marco, Göran, Francesca and Jiye,
>
> here are some review comments on draft-ietf-core-oscore-groupcomm-05:
>
>
> ==
> All document:
> Update references to OSCORE to point to RFC 8613
>

<MT>
Done.
</MT>

> ==
> 1.1
>
> Why allow collisions between Group Identifiers managed by a single GM?
> This seems unnecessary and dangerous, is there a good use-case where
> this is warranted?

<MT>
It does not have any security implications (see Section 8.5).

However, we are now mandating uniqueness of Group Identifiers under the
same Group Manager.
</MT>

>
> ==
> 2.
>
> Why not require the application to prevent collisions between Gids?

<MT>
Do you mean the application at the GM?

The group members cannot "prevent" collisions, but they can handle them,
e.g. trying to use the different matching contexts until one
successfully decrypts the incoming message.
</MT>

>
> ==
> 2.
> "If not already stored in the Recipient Context associated to the
> sender, the recipient retrieves the sender's public key from the Group
> Manager, which collects public keys upon endpoints' joining the  
> group, acts as trusted key repository and ensures the correct
> association between the public key and the identifier of the sender,
> for instance by means of public key certificates."
>
> Note that this requires a device to have two parallel sessions open
> (one with the GM and one on which the message linked to the
> potentially missing public key. This may not always be feasible on
> very constrained devices.

<MT>
We have added some considerations on this, in the third paragraph after
the table in Figure 1.
</MT>

>
> ==
> 2.1.
> "After a new Gid has been distributed, a same Recipient ID ('kid')
> should not be considered as a persistent and reliable indicator of
> the same group member.  Such an indication can be actually achieved
> only by verifying countersignatures of received messages."
>
> This is really counter-intuitive and dangerous. Why can identifiers be
> redistributed within the same group? Shouldn't the GM make sure that
> the same identifier is assigned to a group member, even if the
> security context is updated? If the only reliable identifier is the
> public key, why not make the sender/recipient ID a hash of that public
> key?

<MT>
There is (at least) a case where the GM can assign a new Sender ID to a
current group member. If that node experiences a wrap-around of its own
Sender Sequence Number (used as Partial IV), the node reports that to
the GM. As an alternative to perform a full group rekeying, the GM may
choose to assign a new Sender ID to that sender node, which will
consequently derive a new Sender Key and can resume sending messages
starting from Sender Sequence Number 0. See also [1]. Of course, this
will result in the recipient nodes to derive a new associated recipient
context.

As to the second part of the comment, some group members are not
(necessarily) associated with a public key provided to the GM. This
applies to the "silent servers", that received only and never sends
outgoing message to sign.

[1]
https://tools.ietf.org/html/draft-ietf-ace-key-groupcomm-oscore-03#section-7
</MT>

>
> ==
> 3.
> "... with an Authenticated Encryption with Additional Data (AEAD)
> algorithm"
>
> AEAD expands to "Authenticated Encryption with Associated Data"

<MT>
Ooops. That was an oversight.
</MT>

>
> ==
> 3.1
> "The external_aad in the Additional Authenticated Data (AAD) is
> extended as follows."
>
> As far as I can tell the external_add is not "in" the AAD, it is the
> AAD, so I'd suggest to rephrase to "The external_aad structure of the
> Additional Authenticated Data (AAD) ..."
<MT>
Based on [2], it does not seem to be a one-to-one correspondence. The
external_aad is used to build the AAD.

Anyway, a phrasing like "The external_aad of the Additional
Authenticated Data (AAD) ..." looks good.

[2] https://tools.ietf.org/html/rfc8613#section-5.4
</MT>

>
> ==
> 7.
> "2. [...] Such policies can be enforced locally by the Group Manager,
> or by a third party in a trust relation with the Group Manager and
> entrusted to enforce join policies on behalf of the Group Manager."
>
> This feels unnecessary in the context of this document, since it
> doesn't deal at all with the how/where/why of the policies governing
> access to a group. I would suggest to delete this sentence.

<MT>
I tend to agree with your view. We have now removed that sentence.
</MT>

>
> ==
> 7.
> "3.   Driving the join process to add new endpoints as group members."
>
> This sounds weird. What does "driving the process" mean? Perhaps just
> rephrase to "handle the join process"?

<MT>
Yes, that sounds good.
</MT>

>
> ==
> 7.
> "4.   Establishing Security Common Contexts ..."
>
> This part of the sentence sounds like there is an unintentional word
> swap. Did you mean "Establishing the Common Context part of the
> Security Context"?
>
> Note that the term "Security Common Context" appears in several other
> places throughout the document.

<MT>
Yes, now rephrased also to refer to "Common Context" (all over the
document).
</MT>

>
> ==
> 8.3
> "... a key management scheme for secure revocation and renewal of
> Security Contexts and group keying material ..."
>
> Isn't the "group keying material" part redundant? If I understood
> everything correctly it is part of the Security Contexts.

<MT>
In a simple case, the only group keying material is part of the Group
Security Context.

In general, the GM may use advanced group key management schemes that
also rely on multicast messages to rekey the group more efficiently.
These schemes leverage on additional administrative group key material,
used to securely perform group rekeying.

So "group keying material" above was intended to cover also such
administrative keys. Perhaps it helps to give an intuitive pointer to
this in the text.
</MT>

>
> ==
> 8.4 Second paragraph.
>
> If I read this correctly you propose that applications
> allow recipients to continue using invalid security contexts for a
> limited time after a security context update. This sounds dangerous
> and unnecessary. Why would we want to propose such a measure? We could
> adopt the equivalent procedure here to the one proposed in the third
> paragraph, that is "If a sender receives a Security Context update
> shorty after having sent a message, it can re-send that message using
> the new Security Context."

<MT>
We are leaving the final choice to the application, while still not
recommending this choice and explaining its downsides (end of the second
paragraph).

As to your proposed alternative, I was thinking of the following
sequence of events, considering that C cannot tell for sure if/when S
has switched context.

1. C sends a message M protected with ctx_old.
2. S receives M, decrypts it with ctx_old, and processes it.
3. C and S switch to ctx_new , i.e. S is not much faster than C in its
switching (but C cannot know).
4. C re-sends M protected with ctx_new.
5. R receives M, decrypts it with ctx_new, and processes it again.

So, if S was not much faster than C in its context switching (like
instead discussed in the draft), this re-sending would result in S
processing the same request twice, which is probably not the intention of C.

To make things a bit better, C does not re-send M if it has received a
response from S to the original M. However, what if S just does not
respond or the response is lost? Note that requests over multicast are
Non-CON.
</MT>

>
> ==
> 8.5
>
> Why would an application even allow non-unique group identifiers? This
> makes the whole concept of the group identifier useless. Is there a
> realistic use case where this could happen? Otherwise I suggest
> removing this text.

<MT>
See response above.

I suppose this refers specifically on uniqueness of Group Identifiers
under the same GM. There is not so much you can do for groups under
different (non-synchronized) Group Manager, and just handle possible
collisions at the application.
</MT>

>
> ==
> 8.9
> "Group OSCORE derives the Security Context using the same construction
> of OSCORE"
>
> should be: ...same construction as ...

<MT>
Fixed.
</MT>

>
> ==
> 8.10
> "Thus, other that in such unlikely case, it cannot be defined that
> only messages with sequence number which are equal to previous
> sequence number + 1 are accepted."
>
> I cannot make sense of this sentence, please rephrase, possibly
> splitting it into several sentences.

<MT>
Rephrased as: "Thus, unless only unicast messages are sent in the group,
it cannot be defined that only messages with sequence numbers that are
equal to the previous sequence number + 1 are accepted."
</MT>

>
> ==
> 8.14
> "...this parameter explicitly relate two or more communicating
> endpoints,"
>
> should be "...explicitly relates two ..."

<MT>
Fixed.
</MT>

>
> ==
> 9.1 and 9.2
>
> Would be nice if there was a sentence or two explaining the difference
> between the two registries, as it is not immediately obvious.
>

<MT>
Done.

Note that, taking advantage of the latest updates to the COSE drafts,
we're going to remove the two registries and instead point at:

https://www.ietf.org/id/draft-ietf-cose-rfc8152bis-algs-06.html#name-iana-considerations
</MT>

> ==
> 9.3
> "The IANA Registry established in this document is defined"
>
> should be "Registries ... are defined"

<MT>
Fixed.
</MT>

>
> ==
> Appendix B 5th bullet
>
> The abbreviation LLN should be expanded.

<MT>
Done.
</MT>


>
> ==
> Appendix B 6th bullet
>
> " The latters may reply back ..."
>
> Should be "The latter ..."

<MT>
Done.
</MT>

>
> ==
> Appendix B 6th bullet
>
> Expand the abbreviation "MPL"

<MT>
Done.
</MT>

<MT>
Thank you very much again for your review!
</MT>

>
>
>
> Regards,
>
> Ludwig
>
>
>

-- 
Marco Tiloca
Ph.D., Senior Researcher

RISE Research Institutes of Sweden
Division ICT
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501
https://www.ri.se