Re: [Iotops] WGLC on draft-ietf-iotops-security-protocol-comparison-06
Marco Tiloca <marco.tiloca@ri.se> Tue, 30 April 2024 17:37 UTC
Return-Path: <marco.tiloca@ri.se>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E9601C16940E; Tue, 30 Apr 2024 10:37:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jv69VUA4-uWW; Tue, 30 Apr 2024 10:37:08 -0700 (PDT)
Received: from GVYP280CU001.outbound.protection.outlook.com (mail-swedencentralazon11022010.outbound.protection.outlook.com [52.101.75.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64E2DC14CE51; Tue, 30 Apr 2024 10:37:08 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ewg39lMce6A6JGoR42tq1J/mth4QnC+aUTKNUmw3nLXbF59L1nUwgJ/9Dlu8ipVKveE+i9O7mjdjgUihb2OH44fFUzQetK25occv5QeYX/vJrPES1E0T1rpovWXLNFQU092R9YJsZkVm9u5i8WDYb6v2vx7e0DXiv1tNI480qQGYGvykbxqgHbCCZ4bBrphAvjn8BVEMReqWNIS0YfPXjOFx1jw6HsW7yBJvPWdYXikLwz5BB+ar7GJfmPXLNx0NkmHAxCGzMdJxCw3WOjGJru0M9EiQKt0L71sVaKQq+w7YesEaWjS5Jr8Kex5Y/C7RLU7vfrmk9H/rGfbKQRwBXQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DlkfWETZUvOYmP4Td45CrwhkeFo5yIJxoYKqAG8g9VY=; b=Z9rgEVUa9ACSksdR3808OAINIzTq3MUYAh9CjFwW5wNYMEHqP+SqUy2w6hIBawXGhHenz3JERUeRcVHTU+O5MGV7OviehhFUj9QWRkchJ31/6WG+2tU8Hp+2xElLQuvhWQCIb1XthizftG+tN1GC8LDHzQp9wiR1Cj3DJv7hSMpU55LcGF9p96cXsr53UPxdH/omSwXNrVpz5twsmXFmkB4oUWRg0NVP3ziiAYfdVxotGa5HE/qUOuk0g8wWJyI1isdhlC9Zcp1N+HdIFMEmn8MevxDd5/IaZEGu7VI87pAjSfnsXMa4ksejDr5JHUbY4/UHJ6MYonUovIVLtcs/gQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DlkfWETZUvOYmP4Td45CrwhkeFo5yIJxoYKqAG8g9VY=; b=kYrFgKYJnUMJAXluJpClRfPMumOKnbavJTfA87cEJ+j7z2fl7IVFE//CCadMIJK3Vkv3bTM/0ZQIMvlLA0bfnOmick+b0eMpSoext5qWzBKvKBJy5Iv5aNjSFyK/tjHzBi34WuYqtBpL9IYKjWiVBhYOcvkVyU0wlnbdDHEiiB8=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by GVYP280MB1123.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:199::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7519.35; Tue, 30 Apr 2024 17:37:04 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::ac07:ed64:c098:f1f9]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::ac07:ed64:c098:f1f9%4]) with mapi id 15.20.7519.035; Tue, 30 Apr 2024 17:37:04 +0000
Message-ID: <d8b785fb-676f-414b-8e2b-f4d1fad678db@ri.se>
Date: Tue, 30 Apr 2024 19:37:02 +0200
User-Agent: Mozilla Thunderbird
To: Alexey Melnikov <alexey.melnikov@isode.com>, iotops@ietf.org
Cc: "iotops-chairs@ietf.org" <iotops-chairs@ietf.org>, draft-ietf-iotops-security-protocol-comparison.authors@ietf.org
References: <71ca11c6-f0e4-4eaa-a208-4562bc59288a@isode.com>
Content-Language: en-US
From: Marco Tiloca <marco.tiloca@ri.se>
Autocrypt: addr=marco.tiloca@ri.se; keydata= xsBNBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLNR8ZhDz6Z aRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD+QBdf29pQadrVZAt 0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGNdsY6kPSVzMRyedX7ArLXyF+0 Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZXkLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+ NrSetJlljT0QOXrXMGh98GLfNnLAl6gJryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEB AAHNNk1hcmNvIFRpbG9jYSAobWFyY28udGlsb2NhQHJpLnNlKSA8bWFyY28udGlsb2NhQHJp LnNlPsLAdwQTAQgAIQUCWkAnkAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDuJmS0 DljaQwEvCACJKPJIPGH0oGnLJY4G1I2DgNiyVKt1H4kkc/eT8Bz9OSbAxgZo3Jky382e4Dba ayWrQRFen0aLSFuzbU4BX4O/YRSaIqUO3KwUNO1iTC65OHz0XirGohPUOsc0SEMtpm+4zfYG 7G8p35MK0h9gpwgGMG0j0mZX4RDjuywC88i1VxCwMWGaZRlUrPXkC3nqDDRcPtuEGpncWhAV Qt2ZqeyITv9KCUmDntmXLPe6vEXtOfI9Z3HeqeI8OkGwXpotVobgLa/mVmFj6EALDzj7HC2u tfgxECBJddmcDInrvGgTkZtXEVbyLQuiK20lJmYnmPWN8DXaVVaQ4XP/lXUrzoEzzsBNBFSN eRUBCACWmp+k6LkY4/ey7eA7umYVc22iyVqAEXmywDYzEjewYwRcjTrH/Nx1EqwjIDuW+BBE oMLRZOHCgmjo6HRmWIutcYVCt9ieokultkor9BBoQVPiI+Tp51Op02ifkGcrEQNZi7q3fmOt hFZwZ6NJnUbA2bycaKZ8oClvDCQj6AjEydBPnS73UaEoDsqsGVjZwChfOMg5OyFm90QjpIw8 m0uDVcCzKKfxq3T/z7tyRgucIUe84EzBuuJBESEjK/hF0nR2LDh1ShD29FWrFZSNVVCVu1UY ZLAayf8oKKHHpM+whfjEYO4XsDpV4zQ15A+D15HRiHR6Adf4PDtPM1DCwggjABEBAAHCwF8E GAECAAkFAlSNeRUCGwwACgkQ7iZktA5Y2kPGEwf/WNjTy3z74vLmHycVsFXXoQ8W1+858mRy Ad0a8JYzY3xB7CVtqI3Hy894Qcw4H6G799A1OL9B1EeA8Yj3aOz0NbUyf5GW+iotr3h8+KIC OYZ34/BQaOLzdvDNmRoGHn+NeTzhF7eSeiPKi2jex+NVodhjOVGXw8EhYGkeZLvynHEboiLM 4TbyPbVR9HsdVqKGVTDxKSE3namo3kvtY6syRFIiUz5WzJfYAuqbt6m3TxDEb8sA9pzaLuhm fnJRc12H5NVZEZmE/EkJFTlkP4wnZyOSf/r2/Vd0iHauBwv57cpY6HFFMe7rvK4s7ME5zctO Ely5C6NCu1ZaNtdUuqDSPA==
In-Reply-To: <71ca11c6-f0e4-4eaa-a208-4562bc59288a@isode.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------MK7UGOZKgafqO5ioqWyG0Vyi"
X-ClientProxiedBy: MM0P280CA0037.SWEP280.PROD.OUTLOOK.COM (2603:10a6:190:b::27) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|GVYP280MB1123:EE_
X-MS-Office365-Filtering-Correlation-Id: 489ea5ed-9fe1-466a-2e5d-08dc693c267d
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;ARA:13230031|366007|376005|1800799015;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366007)(376005)(1800799015); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: LPz5zuZDTxjV4vO+ZhPNVUs26TtJijBBtDh+GeonLGbvSnV/J2770kSrG38Rp75D/WnyYQ7JT8fJJDuD71o1rBrRoWpwj29K53JD4sUtYWqU3FN8ax4d2j5uxLjJK+YahxbNlpeSFDEXsBU9e9qWB362TwxbvAJMi47zEm88oWQfN+zZEA8WohSkJXS2pq0ic4RCMHmWSVYfRRvSAKDk+dqEPvt/eWB+GkaNTlLnm3E2wPagtpDT/ZXUdoHWpUhtfmWx8WoWgT9lrYg5MyiQYvFVOD1vQnVN8X8XCUxP9HTIAO07rH6faIS9/rnVSthqKRvHmLhwr30B070dv1T6ZL4bKpRkprO6wgPQuwqs9vQpB0cEZ/vbliO7IxKyPpIqGzehm1bBCiC3DYw8emfhfOZt+KyCrQdAA7AF3rI5+HpueT7+2BBj9dvBMa+i5qxGuCdOTNsZssvZCTUFk6beRTOZDYhtJyJbbj63MSNQZa6gKNfmiAR28gZUrf1ZVCVUhbpm3t/en2RXl0ho9wbMRtt+Hpic+GRfM4wZ1E/O/I5xw7LzR56fXIyKgdWIml/NL6eeeuZnhzWomqBU7obu0l623xSiYTbyzWRDXyfSS38kvxAuSWa347oY6z3GJqfbvvhYPxf+X9tDYEYMqspt2977+sr1qx077OUnPlFczOzVD6/XjodsUldkwlKNMJO2O3BOC37Vz2in3to4Qz4dbILoTeW5dzhedzbKaISPHjQqrDwBfjM52nqOleV/jv3gS1KE39lefsCg4OM/c4dT/KcZmMpR4a9cCJ9axEqVzS/iXpvGele9z78vCn8AnwGxPEAL1/xNlpO2pq2ascHD85Te4X17cMosQVE78+Et6VhsObBDdCJNNn7T4k0jwVA5Z+QE88TxXhL5+wRbLfoqLOU+cQwPJMX3C+FLuJqZXTaGTOzwQqb+UCzLHsFfbl8aqrtR0QBzhxvQPQnUYt3hGA9zkdNrbhEqdVFYwzkvlrXSMYL9O3tHBOCHPlNYE0reLrvHU1uWYiKJqaZ+EOKW50yi6ul6/yD9gh3vKrjQ1pHRSXiO1u6O0K+2kljlgsCleTThVNBlA4nFYgXwhmjyEIAjo1OwHAijSRS8zOzb3bG4BukSZNU9yq62R2JuXtXH0lKqSOdOByMn5VXJ1drXAp+nuobCapVze60ZM/1aE2NO4dug/MVqLq0D+/qjqHYMZShDX0JsEU0RWb7cNVGwqyDah8a7VOJ9PzX5edhn6zc9hPEtyJ/NfWw9m9yYYe0s9Klaw5vXm4Q7sMQi4Uf8kgYhgiszrG2KKzTtgNNbvdf52MW0DhhwxxWkNB4ZCmcaQ4gt8EJcvl4kArHWU0DR9rKEFnKO1nLDou/ofA9rhq3Fxb+W9MuPMvq78dxJeOEwcgaRm2mBiRwbdO6MFqB3YmeFlHyY6pxglHQtyOPoXcW5BqxlcIkaiKAX3pEbxOAiOdMOAlUe9MxtUcM0nrLA+vJDLGgrv+hhya1T/5hq2aJ8hbS3l6lpQSnHX77EG3Yb1DlrZL0tuoGqMacb35SCY1skM/wJTyhSJrkWtp8H7FgAQqVi0F2sz+oxtJoYfh1C
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 489ea5ed-9fe1-466a-2e5d-08dc693c267d
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Apr 2024 17:37:04.5419 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 9CIigStDhAsySSX9QsIuok4CG1kFUi7JD45+jKt1lVIQjicSzSZ/njzrhDWaDAN6SbzQWZ954aiEGYBKDv4TiA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GVYP280MB1123
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/mb6WMP10tp_I6C80RY4hE20Ae0c>
Subject: Re: [Iotops] WGLC on draft-ietf-iotops-security-protocol-comparison-06
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Apr 2024 17:37:13 -0000
Hi all,
I have reviewed this document and I think it's largely ready.
Please find below some suggestions for rephrasing, clarifications, and
minor fixes.
Best,
/Marco
=============
[Section 1]
* "... and long waiting times between frames can be sent (or resent in
the case of transmission errors)."
I think you mean
"... and long waiting times can be experienced between the frames
that are sent (or resent in the case of transmission errors)."
[Section 2]
* "... when used in the combined mode with OSCORE according to ... "
Consistent with the formulation in Appendix A, this should be
"... when used over OSCORE with the EDHOC + OSCORE combined request ... "
[Section 3]
* "The algorithm used/offered are P-256 [SP-800-186] or Curve25519
[RFC7748], ECDSA [FIPS-186-5] with P-256 and SHA-256 or Ed25519
[RFC8032], AES-CCM_8, and SHA-256 [FIPS-180-4]."
Proposed rephrasing:
"The algorithm used/offered are: P-256 [SP-800-186] or Curve25519
[RFC7748]; ECDSA [FIPS-186-5] with P-256 and SHA-256, or EdDSA with
Ed25519 [RFC8032]; AES-CCM_8; and SHA-256 [FIPS-180-4]."
* "DoS protection with DTLS HelloRetryRequest or the CoAP Echo Option is
not considered."
Proposed rephrasing:
"DoS protection with DTLS HelloVerifyRequest [RFC6347], or
HelloRetryRequest [RFC9147], or the CoAP Echo Option [RFC9175] is not
considered."
* "The choices of algorithms are based on the profiles in [RFC7925],
[I-D.ietf-uta-tls13-iot-profile], and [I-D.ietf-core-oscore-edhoc]."
draft-ietf-core-oscore-edhoc does not play a particular role in this
respect. I think that a better reference about this point is simply
Section 3.9 of RFC 9528. Proposed rephrasing:
"The choices of algorithms are based on the profiles in [RFC7925] and
[I-D.ietf-uta-tls13-iot-profile], and on the used EDHOC application
profiles, see Section 3.9 of [RFC9528]."
[Section 3.1]
* "If 8 bytes identifiers are used instead of 1 byte, the RPK numbers
for flight #2 and #3 increases with 7 bytes and the PSK numbers for
flight #1 increases with 7 bytes."
I think you mean:
"If 8 bytes identifiers are used instead of 1 byte, the RPK numbers
for flight #2 and #3 increase of 7 bytes and the PSK numbers for flight
#1 increase of 7 bytes."
* "... and the mandatory to implement algorithms CCM_8, P-256, and ECDSA
[I-D.ietf-uta-tls13-iot-profile] [I-D.ietf-core-oscore-edhoc]."
Instead of draft-ietf-core-oscore-edhoc, the right reference to use
for EDHOC is Section 8 or RFC 9528, where the mandatory-to-implement
algorithms are defined.
* "... with 8 bytes tags which is the mandatory to implement in
[I-D.ietf-uta-tls13-iot-profile] and [I-D.ietf-core-oscore-edhoc]."
Like for the previous comment and with some editorial rephrasing,
this should be
"... with 8 bytes tags, consistent with the algorithms that are
mandatory to implement as per [I-D.ietf-uta-tls13-iot-profile] and
Section 8 of [RFC9528]."
* "If 16 bytes tag are used, the numbers in the #2 and #3 columns
increases with 8 and the numbers in the Total column increases with 16."
I think you mean
"If 16 bytes tag are used, the numbers in the #2 and #3 columns
increase of 8 bytes and the numbers in the Total column increase of 16
bytes."
[Section 3.6.2]
* "Signatures increase the size of flight #2 and #3 with (64 - 8 + 1)
bytes while x5t increases the size with 13-14 bytes."
Actually, the increase due to signatures is (64 - 8 + 2) for
message_3 with kid. Also, it's worth spelling out that the increase due
to x5t is in comparison with kid.
Proposed rephrasing:
"For flight #2 and #3, signatures increase the message size of 57-58
bytes, while x5t increases the size with 13-14 bytes compared to kid."
[Section 4.1]
* "... , and [I-D.ietf-core-oscore-edhoc]."
Like in other comments above, this should be
"... , and Section 8 of [RFC9528]."
* In Figures 5, 6, and 7, the overhead for a Group OSCORE pairwise
request is 1 byte more than for the corresponding OSCORE request (i.e.,
the OSCORE request using a sequence number of the same size, or a Sender
ID of the same size).
This is correct, when considering a zero-length ID Context. In that
case, the OSCORE Option for the Group OSCORE request has the 'h' flag
bit set to 1, and consistently includes the 1-byte field 's' with value
0 and the zero-length field 'kid_context'.
I think it's better to explicitly write the assumption of having a
zero-length ID Context = ''. It would also be consistent with the later,
more detailed Section 4.7 where that assumption is indeed made explicit.
[Section 4.6]
* For each of the three messages, the text says:
"Ciphertext (including encrypted code):"
Based on Section 5.3 of RFC 8613, this should be
"Ciphertext (including a 1-byte encrypted code and a 1-byte payload
marker):"
The overhead bytes are still correctly indicated: in these messages,
the 1-byte payload marker within the ciphertext is the actual
contributor to the OSCORE overhead, while the 1-byte payload marker
before the CoAP payload of the protected message is not.
[Section 4.7]
* "Assuming 1 byte ID Context and Sender ID this adds 2 bytes to requests."
The first part of the sentence contradicts the statement in the next
paragraph, about assuming the zero-length ID Context = '' as intended.
This sentence should simply be
"Assuming the zero-length ID Context and 1-byte Sender ID, this adds
1 byte to requests."
This would also be consistent with the summary in Section 4.1, where
a Group OSCORE request in pairwise mode adds 1 more byte of overhead,
compared to the corresponding OSCORE request that has the same size of
Sender ID and Sequence Number.
* The text says:
OSCORE request (21 bytes, 15 bytes overhead):
93 09 05 42
It should say:
OSCORE request (21 bytes, 15 bytes overhead):
93 19 05 00 42
* The text says:
Option Value (flag byte, ID Context length, sequence nr, Sender ID):
19 00 05 42
It should say:
Option Value (flag byte, sequence nr, ID Context length, Sender ID):
19 05 00 42
* The text says:
"Ciphertext (including encrypted code):"
Based on Section 5.3 of RFC 8613, this should be
"Ciphertext (including a 1-byte encrypted code and a 1-byte payload
marker):"
The overhead bytes are still correctly indicated: in these messages,
the 1-byte payload marker within the ciphertext is the actual
contributor to the OSCORE overhead, while the 1-byte payload marker
before the CoAP payload of the protected message is not.
[Nits]
Section 1
- s/but also high latency, and/but also by high latency and
- s/multi-hop where the/multi-hop and the
- s/CoRE (CoAP, OSCORE)/CoRE (CoAP, OSCORE, Group OSCORE)
- s/LPWAN (SCHC)/LPWAN (SCHC) and SCHC
- s/TLS (cTLS)/TLS (DTLS, cTLS)
Section 2
- s/This section give/This section gives
- s/OSCORE and Group OSCORE is part/OSCORE and Group OSCORE are part
- s/compressed with the Static Context/compressed with Static Context
- s/Use of SCHC can/The use of SCHC can
- s/and IP supports fragmentation/and IP support fragmentation
Section 3
- s/The length of key identifiers are 1 byte./The length of key
identifiers is 1 byte.
- s/The length of connection identifiers are 1 byte./The length of
connection identifiers is 1 byte.
Section 3.1
- s/Figure 2 compares of message sizes/Figure 2 compares the message sizes
- s/The numbers in Figure 2, Figure 2, and Figure 3/The numbers in
Figure 1, Figure 2, and Figure 3
Section 3.2.1.1
- s/the overhead is 185/, the overhead is 185
Section 3.2.1.1
- s/the overhead is 454/, the overhead is 454
- s/ed25519 he overhead is/ed25519, the overhead is
Section 3.2.1.2
- s/RPK the overhead is 255/RPK, the overhead is 255
- s/signature the overhead is 255/signature, the overhead is 255
- s/, the overhead is 255 - 7/, the overhead is 255 - 7
Section 3.2.4
- s/can be a RPK/can be an RPK
Section 3.2.4.1
- s/X.509 the following/X.509, the following
Section 3.2.4.2
- s/X.509 the following/X.509, the following
Section 3.2.7
- s/in TLS consists of/in TLS consist of
Section 3.2.6
- s/the DTLS 1.3 flight sizes changes/, the DTLS 1.3 flight sizes change
Section 3.4
- s/on expected size/of expected sizes
- s/In TLS 1.2 the number/In TLS 1.2, the number
Section 3.5
- s/Using secp256r1 instead x25519 add/Using secp256r1 instead of x25519
adds
- s/Using ecdsa_secp256r1_sha256 instead ed25519 add/Using
ecdsa_secp256r1_sha256 instead of ed25519 adds
Section 3.6
- s/static Diffie-Hellman are identified/static Diffie-Hellman keys are
identified
Section 3.7
- s/overhead of fragmentation/overhead due to fragmentation
Section 3.6.2
- s/Figure 4: Typical message sizes in bytes/Figure 4: Typical EDHOC
message sizes in bytes
Section 4
- s/TLS 1.2 and TLS 1.3/TLS 1.2, and TLS 1.3
Section 4.1
- s/Figure 6, and {fig-overhead3}/Figure 6, and Figure 7
- s/all numbers increases with 8./all numbers increase of 8.
Section 4.2.1
- s/The nonce follow the/The nonce follows the
Section 4.2.3
- s/calculations in this section uses/calculations in this section use
Section 4.8
- s/As can be seen/As it can be seen
- s/requests with 20%/requests by 20%
- s/terminated in CoAP proxies/terminated at CoAP proxies
Section 5
- s/for respective protocol/for the respective protocol
Appendix A
- s/Assuming a that/Assuming that
- s/that CoAP Content-Format is/that the Content-Format CoAP option is
- s/the CoAP URI/that the CoAP URI
- s/URI-Path/Uri-Path (2 instances)
On 2024-04-17 19:48, Alexey Melnikov wrote:
> Dear IOTOPS participants,
>
> This message is starting 2 weeks WGLC on
> draft-ietf-iotops-security-protocol-comparison-06 ("Comparison of CoAP
> Security Protocols") that will end on May 2nd 2024. If you've read the
> document and think that it is ready (or not ready) for publication as
> an RFC, please send a message in reply to this email or directly to
> IOTOPS chairs (iotops-chairs@ietf.org) If you have detailed comments,
> these would also be very helpful at this point.
>
> As a reminder, we will park this document after WGLC until the time
> when its depencies are stable/complete.
>
> Thank you,
> Alexey, for IOTOPS chairs
>
--
Marco Tiloca
Ph.D., Senior Researcher
Phone: +46 (0)70 60 46 501
RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)
Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity
https://www.ri.se
- [Iotops] WGLC on draft-ietf-iotops-security-proto… Alexey Melnikov
- Re: [Iotops] WGLC on draft-ietf-iotops-security-p… Marco Tiloca
- [Iotops] Re: WGLC on draft-ietf-iotops-security-p… Thomas Fossati
- [Iotops] Re: WGLC on draft-ietf-iotops-security-p… Francesca Palombini
- Re: [Iotops] WGLC on draft-ietf-iotops-security-p… Alexey Melnikov
- [Iotops] Re: WGLC on draft-ietf-iotops-security-p… Francesca Palombini
- [Iotops] Re: WGLC on draft-ietf-iotops-security-p… Marco Tiloca