Skip to content

Commit 1cb469a

Browse files
Clarified prescriptive sources of configuration for the KDC
1 parent d85017e commit 1cb469a

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

draft-ietf-ace-key-groupcomm.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -800,7 +800,7 @@ Then, the handler performs the following actions.
800800

801801
- The handler adds the retrieved Client's authentication credential to the stored list of authentication credentials stored for the group identified by GROUPNAME. If such list already includes an authentication credential for the Client, but a different authentication credential is specified in the 'client_cred' field, then the handler MUST replace the old authentication credential in the list with the one specified in the 'client_cred' field.
802802

803-
* If the application requires backward security or if the used application profile prescribes so, the KDC MUST generate new group keying material and securely distribute it to the current group members (see {{sec-group-rekeying}}).
803+
* If backward security is prescribed by application policies installed at the KDC or by the used application profile of this specification, then the KDC MUST generate new group keying material and securely distribute it to the current group members (see {{sec-group-rekeying}}).
804804

805805
* The handler returns a successful Join Response as defined below, containing the symmetric group keying material; the group policies; and the authentication credentials of the current members of the group, if the KDC manages those and the Client requested them.
806806

@@ -1716,7 +1716,7 @@ In either case, the KDC performs the following actions.
17161716

17171717
The response MUST have Content-Format set to application/ace-groupcomm+cbor and is formatted as defined in {{key-distr}}. The value of the 'error' field MUST be set to 5 ("Group membership terminated").
17181718

1719-
* If the application requires forward security or the used application profile requires so, the KDC MUST generate new group keying material and securely distribute it to all the current group members except the leaving node (see {{sec-group-rekeying}}).
1719+
* If forward security is prescribed by application policies installed at the KDC or by the used application profile of this specification, then the KDC MUST generate new group keying material and securely distribute it to all the current group members except the leaving node (see {{sec-group-rekeying}}).
17201720

17211721
# Group Rekeying Process {#sec-group-rekeying}
17221722

0 commit comments

Comments
 (0)