Re: [core] I-D Action: draft-ietf-core-oscore-groupcomm-10.txt
Marco Tiloca <marco.tiloca@ri.se> Thu, 25 February 2021 18:34 UTC
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 89FB13A1E66 for <core@ietfa.amsl.com>; Thu, 25 Feb 2021 10:34:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MSGID_FROM_MTA_HEADER=0.001, NICE_REPLY_A=-0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pjWuNETFyO2v for <core@ietfa.amsl.com>; Thu, 25 Feb 2021 10:34:25 -0800 (PST)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2081.outbound.protection.outlook.com [40.107.21.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 184C83A18AE for <core@ietf.org>; Thu, 25 Feb 2021 10:34:24 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GE8A594aWl9mk7qC1hKhvH0sWJvIh0iisFBcajs+8IydbS8yzwAfC33ujSPqLVJTajiZnJwl40WsZg74lPqfs8GHQwDo0fYo91SKxsWxf/W9VULsLYpj0ThYYK0c9MWj0UB8LnWVkFjmvFDRllLJfHOGQ7Tcfb2BvUjb1iil9qJInhoFZsiy+OagrPVnhnwo1bD95JuqNGNqIDxyM/G1mhZr4GKRySBC1cD2AzdCMp5S5pPsRD3yVxtJ9+T8DlICnbJ8tYINXMZH37OLlc7whxrgy5KnZdRDUVBgZAFIE9os6tSvvlESWZbmWvoumPp2PGpmch8JwoQ6HlpUj+BGxQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DvB8whKINLCXt+HHuNCnlkB9ojAp7fdD8xeXqPwxcv0=; b=bTkJf4gaJ/sO9pf1rCDpViEhS2ZGaO1hawr8N70MSqU8V3XZ9kojw8TN5SfrDjdbkOeINaCKsNsgc01SGNBk9DQFFhe8ezX6tlxEEVk0qe68pui3U0djSgZQPrDPPOi5NV20rLOAHxJFLj7/HZ3gMx+dgbKGaRBggQVHQsP+Sc7WE4acj/XTiZTSGkNh7PD8bZ0gve+u3G0y6ZEAj49MbY+fiTh9FiZoXvIAIPLxgbDrb+IDU6N98fT4dwyDELPJKaP1HwTdgJGCjASE7dlrvDFZcwDmMUl2Sf9S2KA8NSoOCYG4d2Bq7pWKyKxqmM88j98ym509Wj9qtR38DqA/1A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DvB8whKINLCXt+HHuNCnlkB9ojAp7fdD8xeXqPwxcv0=; b=eW6TngoomFebCyXA2i1evMqbyK7lJnWTCjeCJHQCmfckQLu5c3b3g01mTOfU09HdeXsj1xMZVLrTjJ8j/oZOBcGLCSBXpN9WWPALGUZDccsB60APQOocE6a8Oaq7SuVlEBchvdruNKLcVuHuUSaOBoNOcn42vyQ+/6IZdgj9n5o=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by DBBP189MB1162.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:1e2::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.20; Thu, 25 Feb 2021 18:34:20 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::1df7:be0c:4934:88bf]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::1df7:be0c:4934:88bf%9]) with mapi id 15.20.3890.020; Thu, 25 Feb 2021 18:34:20 +0000
To: Christian Amsüss <christian@amsuess.com>, core@ietf.org
References: <160433906029.4820.14907779807204481594@ietfa.amsl.com> <20201110171530.GA1301772@hephaistos.amsuess.com>
From: Marco Tiloca <marco.tiloca@ri.se>
Message-ID: <4be0d9c5-7bf1-5b75-8668-a6674ff086c9@ri.se>
Date: Thu, 25 Feb 2021 19:34:17 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
In-Reply-To: <20201110171530.GA1301772@hephaistos.amsuess.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="S6ANAbb8Fk0tLM3re6yKlftdVz2W7fSWH"
X-Originating-IP: [185.236.42.111]
X-ClientProxiedBy: OL1P279CA0034.NORP279.PROD.OUTLOOK.COM (2603:10a6:e10:13::21) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [10.8.0.6] (185.236.42.111) by OL1P279CA0034.NORP279.PROD.OUTLOOK.COM (2603:10a6:e10:13::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3890.19 via Frontend Transport; Thu, 25 Feb 2021 18:34:20 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: a3616356-3122-42d3-a742-08d8d9bbf751
X-MS-TrafficTypeDiagnostic: DBBP189MB1162:
X-Microsoft-Antispam-PRVS: <DBBP189MB11624B112D6CB0687389454D999E9@DBBP189MB1162.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:9508;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(396003)(136003)(376002)(39850400004)(346002)(366004)(235185007)(2616005)(16526019)(5660300002)(26005)(66946007)(4001150100001)(166002)(31686004)(66476007)(66556008)(186003)(8936002)(8676002)(2906002)(30864003)(6486002)(44832011)(956004)(6666004)(83380400001)(33964004)(478600001)(66574015)(36756003)(16576012)(966005)(31696002)(316002)(86362001)(45080400002)(52116002)(53546011)(21480400003)(45980500001)(43740500002)(579004); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: a3616356-3122-42d3-a742-08d8d9bbf751
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Feb 2021 18:34:20.7606 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: TzFA+pZ4EgF8Q5GBL5l9NbjHH4K9oAFF/OnEde4nJ8pdf9OfKQJ0F2yFruP7L2UV333Hgidm1Psp3wJoxjKL3w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBP189MB1162
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/quxfWG2mZnp--5gP10PAZOfPwbU>
Subject: Re: [core] I-D Action: draft-ietf-core-oscore-groupcomm-10.txt
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Feb 2021 18:34:38 -0000
Hi Christian,
Thanks a lot for this review and the discussion around the raised
points, it was really useful!
We have taken your comments into account in the latest version -11.
Please, check whether they are all properly addressed.
See also below detailed inline replies to your comments.
Best,
/Marco
On 2020-11-10 18:15, Christian Amsüss wrote:
> Hello OSCORE-groupcomm authors,
>
> thanks for incorporating my earlier comments.
>
> While reading -10 for the purpose of implementing it, a few more points
> came up (in linear order of the document):
>
> * "Furthermore, sufficiently large replay windows should be
> considered,": This paragraph reads as if a server receiving a high
> sequence number gets completely out of sync (to the point where it
> needs to recover), when actually the only ill-effect of a, say, a jump
> from 1000 to 1100 with a 32bit replay window is that a delayed message
> with sequence number 1002 will be rejected. The next message at 1101
> will still be accepted.
>
> Recovery *will* be necessary if the server has, in the mean time,
> evicted the client's replay window out of its list of available
> windows. So maybe the recommendation should rather be to not have
> overly long replay windows (or to suggest the replay windows may be
> truncated when unused), as that'd allow the server to keep more
> clients' replay windows around.
>
> (Or I just misread the paragraph).
==>MT
Section 6.1 "Update of Replay Window" now treats the possible jumping
forward of the Sender Sequence Number as something that the server has
to simply be fine to handle, just as in OSCORE.
The recovery, including the case of overloading of Recipient Contexts,
is also mentioned here in Section 6.1, but now separately discussed in
Section 2.4.1.2 "Overflow of Recipient Contexts".
<==
>
> * It felt like there are different ways for the sender sequence number
> to go back to 0. (Search for " to 0", first three occurrences). What's
> really the case is that the first two *trigger* the third, but the
> repetition around there made them read like separate things.
==>MT
The text has been restructured to clarify cause-effect relations in a
more linear way.
That is, Section 2.4.1 "Loss of Mutable Security Context" and Section
2.4.2 "Exhaustion of Sender Sequence Number" are both possible causes
that trigger what described in Section 2.4.3 "Retrieving New Security
Context Parameters".
The resulting actions are getting a new Sender ID (Section 2.4.3.1)
and/or participating to a group rekeying (Section 2.4.3.2). In either
case, the involved client resets its Sender Sequence Number to 0.
==>
>
> * "and SHOULD preserve the current value of the Sender ID of each group
> member.": Why bother? It's not like anything can be reused after the
> master secret changed.
>
> ("bother", because the GM may want to hand out KIDs sequentially
> rather than tracking a bitfield).
>
> * Oh, I see -- later on it says that KIDs can never be reused, even
> when master parameters change. Doesn't that lead to irrecoverably
> large KIDs over time? (Ie. they're shiny short first, but after a
> few joinings, group leaves, device restarts and other fluctuation,
> they wind up in the >=4-byte range).
>
> This also reads a bit controversially -- it says "Even if Gid and
> Master Secret are renewed as described in this section, the Group
> Manager MUST NOT reassign", which sounds like "never ever", but
> misses the master salt from the line above. And it refers to
> 2.4.3.1, where it only talks about KID reuse ~"if none of the master
> parameters change". 3.2 item 5 reads like "never ever" again, so
> this needs clarification first and then editing.
==>MT
Following also more discussions, we went for the following updates.
Within an OSCORE group, the Group Manager must assign a Sender ID that
has never been assigned before in the group under the current Gid value
(see Section 2.4.3.1 and Section 3.2).
Within an OSCORE group, the Group Manager must assign a Gid that has
never been assigned ever before in the group (see Section 2.4.3.1 and
Section 3.2).
<==
>
> * "The value of the 'kid' parameter in the 'unprotected' field of
> response messages MUST be set to the Sender ID of the endpoint
> transmitting the message."
>
> Is this the case even when requests were made in pairwise mode?
>
> (For comparison, the section above (4.1) is explicitly "for group mode
> only", and 4.3 says "in group and pairwise mode".)
==>MT
We have updated Section 4.2 "The COSE Object" to mandate 'kid' in
responses only if sent as reply to a request protected in group mode.
The examples in Section 5.1.2 are also updated accordingly.
<==
>
> * Does it make sense to use the 4.3 extended parameters (with the new
> algorithm data and the added group ID) in pairwise mode?
>
> After all, everything else in there (including the group mode bit)
> is really just vanilla OSCORE. Or are observations in
> pairwise-pairwise mode supposed to survive rekeying? (If that's the
> case, the question may arise whether anyone might be tempted to use
> pairwise-pairwise in a 1:1 setting just to use that property).
==>MT
Yes, observations are intended to continue after a group rekeying,
regardless the mode used to protect messages.
Some information in the two external_aad is not relevant in pairwise mode.
As discussed at IETF 109, we ended up converging to a single
external_aad structure, used in both modes of operations and for both
encrypting and signing (see Section 4.3).
<==
>
> * external_aad: Why is countersign_key_type_capab in there twice?
==>MT
As part of the external_aad restructuring (see previous comment), the
new single format in Section 4.3 does not repeat the key type
capabilities anymore.
<==
>
> * "The new element 'request_kid_context' contains the value of" could
> use some explaining why this now is in here.
>
> AFAIR, it is to allow observations to extend over rekeyings.
==>MT
We have added a bullet point in Section 4.3 to explain why the new
parameter is there.
<==
> (Shouldn't also, due to this, KIDs be reusable once the KID-Context is
> changed?)
==>MT
Yes, that's also been addressed (see previous comment on allowed
recyclying of Sender IDs under different GIDs).
<==
>
> Same for the OSCORE_option being present in the signature
> external_aad. (A forward reference to 10.6.2 may do).
==>MT
We have added a bullet point in Section 4.3 to explain why the new
parameter is there.
This also includes a forward pointer to Section 10.6, which describes an
attack that the OSCORE_option parameter makes infeasible to perform when
the group mode is used.
<==
>
> * Examples in Group Mode: I think it's easier to grasp if rather than
> using the value "COUNTERSIGN", a signature value a la "de 9e ... f1" /
> 0xde9e...f1 (depending on the representation) were used; the
> COUNTERSIGN value reads too much like a constant in the
> before-compression COSE object ("What's that, a numeric, a tagged
> value?").
==>MT
Done. See examples in Section 5.1.1.
<==
>
> * "Note that, if the Group Flag is set to 0, and the recipient endpoint
> retrieves a Security Context which is valid to process the message
> but is not associated to an OSCORE group,"
>
> I don't have a fleshed-out proposal here, but we may manage to use the
> same bit for other purposes in non-group-OSCORE messages.
>
> As the introduction to that section states, the receiver MUST be able
> to distinguish from the KID context and KID whether it's from a Group
> OSCORE or a different context. For Group OSCORE, that bit
> distinguishes between group and pairwise. For other, that other may
> use that bit.
>
> (I know that this is contradicting the previous suggestion that led to
> this bit being flipped in -09; recent discussions about flag bit usage
> indicate to me that other ways of getting OSCORE keys may have
> different varieties as well, and this would align well then).
==>MT
We have updated the text so that a Security Context is retrieved first,
before checking the Group Flag bit.
See especially Section 7 (second bullet point) and the rephrasing for
the IANA registration in Section 11.1.
<==
>
> * "For each ongoing observation, the server MUST include in the first
> notification": This may get sucked up by a proxy that doesn't forward
> until a following notification arrives.
>
> Moreover, it may be unnecessary if the rekeying fits snugly between
> notifications.
>
> Suggested alternative:
>
> The server can help the client synchronize by sending the Gid as the
> ID Context for notifcations following a rekeying. If there is a known
> upper limit to the duration of a full rekeying, it SHOULD set the Gid
> during that time. Otherwise, it SHOULD set it until the Max-Age of the
> last notification before the rekeying has expired.
==>MT
Thanks, we have accordingly updated the last two paragraphs in Section
8.3.1.
<==
>
> * "Senders MUST NOT use the pairwise mode to protect a message intended
> for multiple recipients.": That's a factual and not an
> interoperability statement. It can not.
>
> If that's meant to rule out a pairwise request to the broadcast
> address (hoping that the right node will answer), it should say
> "protect a message sent to multiple recipients".
>
> (But probably that's not what's meant, given 9.1 proposes an address
> discovery resource, and for accessing that by a single KID the
> pairwise mode would make a good choice).
==>MT
Thanks for this good input. It should be captured now in the sixth and
seventh paragraphs of Section 9.
<==
>
> * Sections 9.2ff are described as a delta to 8.1ff.
>
> Given the external_aad and key choices are already in the section 9
> header, would there be any per-step delta left to explain at all if
> they were instead relative to RFC8613 Section 8? That'd make Section 9
> a lot slimmer.
==>MT
Sections 9.2-9.6 have been rewritten as a delta from RFC 8613.
<==
>
> * I'm still not fully sold on why the Object-Security option needs to be
> in the external_aad -- but having two versions of the external_aad
> seems extraneous to me. If the option needs to be in there, I think
> it'd be easier to have it in the external_aad for all purposes right
> away.
==>MT
This is now explained in the last bullet point of Section 4.3, together
with a forward pointer to Section 10.6 where the addressed attack is
discussed.
This is also part of the broader update to the external_aad, now having
a single format for both modes of operation, and for both signing and
encrypting.
<==
>
> Also, was treating the OSCORE option as Class I considered? That
> doesn't solve the problem of having many different external_aad
> constructions, but it'd be using existing mechanism. (Although
> implementors may curse if they didn't do Class I yet).
>
> I'll come back to that once I've actually implemented it.
==>MT
Having the OSCORE option of class I was once considered but just
dismissed to not bother implementers :-) That's when relying on the
external_aad was considered instead.
<==
>
> * "Unless exchanges in a group rely only on unicast messages": I think
> that's only understandable for readers that have an active memory of
> Section 7.4 of RFC8613; it'd need either more context or slimming
> down, maybe like this?
>
> "As multicast usually involves unreliable transports, the
> simplification of the replay window to a size of 1 that's suggested in
> RFC8613 Section 7.4 is not viable with Group OSCORE."
==>MT
Based on your input, we updated Section 10.10 with the current third
paragraph.
<==
>
> * Summarizing the KID-reuse questions, I think a diagram of the
> componetns may help, like:
>
> ←--→ KID
> Secret ←--→ Group ID ←--→ KID
> ←--→ KID
> ↑
> Change in ↑ ↑-- Group ID changes allow old KIDs to be reused
> lockstep | (but KIDs usually stay the same for efficient rollout)
> --- KID changes don't necessitate a Group ID change
>
> (are there any other components that can chagnge?)
>
> In that context: Can an ancient group ID be reused?
==>MT
Done. See Figure 2 in Section 3.1.
<==
>
> * E.1 and E.2 Best Effort Synchronization / Baseline Synchronization
>
> A server doing any of these needs to use own Partial IVs all the time.
> It may be acceptable in a scenario to eat the replays, but it's almost
> certainly not acceptable to commit nonce reuse (which *can* happen
> with Best Effort Synchronization).
==>MT
Right, *that* whiteboard discussion at the IETF 109 Hackathon! :-)
This has resulted in the following updates:
* Section 2.2 (last paragraph) explains the need to limit the number of
Recipient Contexts for an endpoint, and the possibility of an overflow.
* A clearer distinction between anti-replay and freshness. Changes
affect the following Sections:
--- 2.2 "Security Context and Recipient Context"
--- 2.4 "Update of Security Context"
--- 2.4.1 "Loss of Mutable Security Context"
--- 2.4.1.1 "Reboot and Total Loss"
--- 2.4.1.2 "Overflow of Recipient Contexts"
--- 6.1 "Update of Replay Window"
--- 6.2 "Message Freshness"
--- 10.10 "Replay Protection" (Security considerations)
--- 10.11 "Message Freshness" (Security considerations)
--- Appendix E (was E.3) "Challenge-Response Synchronization"
* Removed the old Appendix E.1 and Appendix E.2, as non relevant
synchronization approaches.
<==
>
> * E.3 Challenge-Response Synchronization:
>
> "The server MUST NOT set the Echo Option to a value which is both
> predictable and reusable." While this is technically correct, it's
> hard to evaluate as a reader. How about "The Echo option value SHOULD
> not be reused, and when it is MUST be highly unlikely to have been
> used with this client recently."?
==>MT
Done, see the second paragraph of current Appendix E.
<==
>
> * "sends a request as a unicast message addressed to the same server":
>
> That should indicate pairwise mode.
>
> There's later paragraphs on this where 10.7 is mentioned, but given
> how widely this open things up, pairwise mode should be mandatory on
> Echo recovery.
==>MT
Done, see the fifth paragraph of current Appendix E.
<==
>
> * "The server either delivers the request to the application if it is
> an actual retransmission of the original one, or discards it
> otherwise": For that the server would need to remember. Ther *is*
> somethign to take care of, though: Only the first time the Echo
> request arrives it can be processed, otherwise it may reset an
> already good replay window.
>
> Suggesting to replace the paragraph with:
>
> "If the verification is successful and the replay window has not
> been set yet, the server updates its Replay Window to mark the
> current sequence number as seen (but all newer ones as new), and
> forwards the message as fresh to the application.
>
> Otherwise, it discards the verification result and treats the
> message as fresh or replay according to the existing replay window."
==>MT
Done, see the second paragraph after the bullet list, in current Appendix E.
<==
>
> "(believed to be) lost"
>
> How is that not a binary thing? (May relate to the first question).
> Either there is a replay window, in which case it can be used (and
> it does get fast-forwarded in need be), or not and it needs to be
> recovered.
>
> The following paragraphs elaborate on what a loss would mean, but
> don't explain why it would be relevant. Something like this would be
> applicable if we only ever transported the last bits of the sequence
> numbers in a sliding-window fashion, but that's not what happens in
> OSCORE.
==>MT
Done.
Thanks a lot again for your input and comments!
Best,
/Marco
<==
>
> KR
> Christian
>
>
> _______________________________________________
> core mailing list
> core@ietf.org
> https://eur02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fcore&data=04%7C01%7Cmarco.tiloca%40ri.se%7Cc21e90c15f74443ad3e008d8859c67df%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C637406254091815430%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=SC37JAoObx0rWMO%2FVKg89UqH54lmO3ObPSqcDBRPdtc%3D&reserved=0
--
Marco Tiloca
Ph.D., Senior Researcher
RISE Research Institutes of Sweden
Division ICT
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)
Phone: +46 (0)70 60 46 501
https://www.ri.se
- [core] I-D Action: draft-ietf-core-oscore-groupco… internet-drafts
- Re: [core] I-D Action: draft-ietf-core-oscore-gro… Christian Amsüss
- Re: [core] I-D Action: draft-ietf-core-oscore-gro… Marco Tiloca