[Secdispatch] FW: EDHOC and Transports

Jim Schaad <ietf@augustcellars.com> Fri, 25 January 2019 06:38 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C646412D4EC for <secdispatch@ietfa.amsl.com>; Thu, 24 Jan 2019 22:38:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id l98HPde-Kkuk for <secdispatch@ietfa.amsl.com>; Thu, 24 Jan 2019 22:38:32 -0800 (PST)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9C525129508 for <secdispatch@ietf.org>; Thu, 24 Jan 2019 22:38:31 -0800 (PST)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 24 Jan 2019 22:38:25 -0800
From: Jim Schaad <ietf@augustcellars.com>
To: secdispatch@ietf.org
References:
In-Reply-To:
Date: Thu, 24 Jan 2019 22:38:22 -0800
Message-ID: <00ae01d4b478$92fa9d40$b8efd7c0$@augustcellars.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdS0aYd+IIiEJdHOSfGMDJ3y6un6LAADvM8A
Content-Language: en-us
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/f47TKbrApBq8Z2256GUe4rL6pnU>
Subject: [Secdispatch] FW: EDHOC and Transports
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Jan 2019 06:38:34 -0000

Send it to the right mailing list.

-----Original Message-----
From: Jim Schaad <ietf@augustcellars.com> 
Sent: Thursday, January 24, 2019 9:08 PM
To: 'secdir@ietf.org' <secdir@ietf.org>
Subject: EDHOC and Transports

Someplace over the set of messages which I recently scanned one of the
questions was what were the constrained restrictions that we were looking at
as part of the evaluation process.

There are three that I will highlight even though I am only able to provide
any type of quantification for two of them:

1.  Low-power devices that either are battery based or scavenge power, these
devices pay a power penalty for every byte of data sent and thus have a
desire for the smallest messages possible.

2. CoAP over SMS:  SMS has a 140 byte packet size.  There are two approaches
for dealing with packets of larger than 140 bytes:  1) There is a method of
appending multiple packets together to form a single larger packet.  2) You
can use CoAP blockwise transfer.  Using CoAP blockwise would result in 128
byte packets for the underlying transfer assuming that only 12 bytes are
needed for the CoAP header itself.

3. 6LoPan over IEEE 802.15.4:  This has a packet size of 127 bytes.  The
maximum frame overhead size is 25 bytes allowing for 102 bytes of message
space.   If one assumes 20 bytes of overhead for CoAP then this means a
protocol packet size of 82 bytes.  If one needs to break the message across
multiple packets then the maximum data size is going to be 64 bytes using
CoAP blockwise options.

There are of course two additional transports which are to be considered
IPV4 UDP and IPV6 UDP.  Both of these transports have a packet size which is
sufficiently large to hold a any given message using TLS or EDHOC.

Jim