You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: draft-ietf-ace-key-groupcomm.html
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -1487,7 +1487,7 @@ <h2 id="name-introduction">
1487
1487
<pid="section-1-3">In particular, this document defines the operations and interface available at the KDC, as well as general message formats for the interactions between Clients and KDC. At the same time, communications in the group can rely on different approaches, e.g., based on multicast <span>[<ahref="#I-D.ietf-core-groupcomm-bis" class="cite xref">I-D.ietf-core-groupcomm-bis</a>]</span> or on publish-subscribe messaging <span>[<ahref="#I-D.ietf-core-coap-pubsub" class="cite xref">I-D.ietf-core-coap-pubsub</a>]</span>, and can be protected in different ways.<ahref="#section-1-3" class="pilcrow">¶</a></p>
1488
1488
<pid="section-1-4">Therefore, this document delegates details on the communication and security approaches used in a group to separate application profiles. These are specialized instances of this document, targeting a particular group communication approach and defining how communications in the group are protected, as well as the specific keying material and configuration parameters provided to group members.<ahref="#section-1-4" class="pilcrow">¶</a></p>
1489
1489
<pid="section-1-5">In order to ensure consistency and aid the development of such application profiles, <ahref="#req" class="auto internal xref">Appendix A</a> of this document defines a number of related compliance requirements. In particular, <ahref="#req-mandatory" class="auto internal xref">Appendix A.1</a> compiles the requirements that application profiles are REQUIRED to fulfill; these are referred to by an identifier that starts with "REQ". Instead, <ahref="#req-optional" class="auto internal xref">Appendix A.2</a> compiles the requirements that application profiles MAY fulfill; these are referred to by an identifier that starts with "OPT".<ahref="#section-1-5" class="pilcrow">¶</a></p>
1490
-
<pid="section-1-6">New keying material is generated and distributed to the group upon membership changes (rekeying), if the application requires backward security (i.e., new group members must be prevented from accessing communications in the group prior to their joining) and forward security (i.e., former group members must be prevented from accessing communications in the group after their leaving).<ahref="#section-1-6" class="pilcrow">¶</a></p>
1490
+
<pid="section-1-6">New keying material is intended to be generated and distributed to the group upon membership changes (rekeying). If the application requires backward security (i.e., new group members must be prevented from accessing communications in the group prior to their joining), then a rekeying has to occur every time new members join the group. If the application requires forward security (i.e., former group members must be prevented from accessing communications in the group after their leaving), then a rekeying has to occur every time current members leave the group or are evicted from the group.<ahref="#section-1-6" class="pilcrow">¶</a></p>
1491
1491
<pid="section-1-7">A group rekeying scheme performs the actual distribution of the new keying material, by rekeying the current group members when a new Client joins the group, and the remaining group members when a Client leaves the group. This can rely on different approaches, including efficient group rekeying schemes such as <span>[<ahref="#RFC2093" class="cite xref">RFC2093</a>]</span>, <span>[<ahref="#RFC2094" class="cite xref">RFC2094</a>]</span>, and <span>[<ahref="#RFC2627" class="cite xref">RFC2627</a>]</span>.<ahref="#section-1-7" class="pilcrow">¶</a></p>
1492
1492
<pid="section-1-8">Consistently with what is recommended in the ACE framework, this document uses CBOR <span>[<ahref="#RFC8949" class="cite xref">RFC8949</a>]</span> for data encoding. However, using JSON <span>[<ahref="#RFC8259" class="cite xref">RFC8259</a>]</span> instead of CBOR is possible, by relying on the conversion method specified in Sections <ahref="https://rfc-editor.org/rfc/rfc8949#section-6.1" class="relref">6.1</a> and <ahref="https://rfc-editor.org/rfc/rfc8949#section-6.2" class="relref">6.2</a> of <span>[<ahref="#RFC8949" class="cite xref">RFC8949</a>]</span>.<ahref="#section-1-8" class="pilcrow">¶</a></p>
<pid="appendix-D-1">The following individuals were helpful in shaping this document: <spanclass="contact-name">Christian Amsüss</span>, <spanclass="contact-name">Carsten Bormann</span>, <spanclass="contact-name">Roman Danyliw</span>, <spanclass="contact-name">Martin Duke</span>, <spanclass="contact-name">Thomas Fossati</span>, <spanclass="contact-name">Vidhi Goel</span>, <spanclass="contact-name">Rikard Höglund</span>, <spanclass="contact-name">Ben Kaduk</span>, <spanclass="contact-name">Erik Kline</span>, <spanclass="contact-name">Watson Ladd</span>, <spanclass="contact-name">John Preuß Mattsson</span>, <spanclass="contact-name">Daniel Migault</span>, <spanclass="contact-name">Zaheduzzaman Sarker</span>, <spanclass="contact-name">Jim Schaad</span>, <spanclass="contact-name">Ludwig Seitz</span>, <spanclass="contact-name">Göran Selander</span>, <spanclass="contact-name">Cigdem Sengul</span>, <spanclass="contact-name">Henry Thompson</span>, <spanclass="contact-name">Peter van der Stok</span>, and <spanclass="contact-name">Paul Wouters</span>.<ahref="#appendix-D-1" class="pilcrow">¶</a></p>
5649
+
<pid="appendix-D-1">The following individuals were helpful in shaping this document: <spanclass="contact-name">Christian Amsüss</span>, <spanclass="contact-name">Carsten Bormann</span>, <spanclass="contact-name">Roman Danyliw</span>, <spanclass="contact-name">Martin Duke</span>, <spanclass="contact-name">Thomas Fossati</span>, <spanclass="contact-name">Vidhi Goel</span>, <spanclass="contact-name">Rikard Höglund</span>, <spanclass="contact-name">Ben Kaduk</span>, <spanclass="contact-name">Erik Kline</span>, <spanclass="contact-name">Warren Kumari</span>, <spanclass="contact-name">Watson Ladd</span>, <spanclass="contact-name">John Preuß Mattsson</span>, <spanclass="contact-name">Daniel Migault</span>, <spanclass="contact-name">Zaheduzzaman Sarker</span>, <spanclass="contact-name">Jim Schaad</span>, <spanclass="contact-name">Ludwig Seitz</span>, <spanclass="contact-name">Göran Selander</span>, <spanclass="contact-name">Cigdem Sengul</span>, <spanclass="contact-name">Henry Thompson</span>, <spanclass="contact-name">Peter van der Stok</span>, and <spanclass="contact-name">Paul Wouters</span>.<ahref="#appendix-D-1" class="pilcrow">¶</a></p>
5650
5650
<pid="appendix-D-2">The work on this document has been partly supported by VINNOVA and the Celtic-Next project CRITISEC; by the H2020 project SIFIS-Home (Grant agreement 952652); and by the EIT-Digital High Impact Initiative ACTIVE.<ahref="#appendix-D-2" class="pilcrow">¶</a></p>
Copy file name to clipboardExpand all lines: index.html
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ <h2>Preview for branch <a href="warren-kumari-review">warren-kumari-review</a></
45
45
<tr>
46
46
<td><ahref="warren-kumari-review/draft-ietf-ace-key-groupcomm.html" class="html draft-ietf-ace-key-groupcomm" title="Key Provisioning for Group Communication using ACE (HTML)">Key Provisioning for Group Communication</a></td>
47
47
<td><ahref="warren-kumari-review/draft-ietf-ace-key-groupcomm.txt" class="txt draft-ietf-ace-key-groupcomm" title="Key Provisioning for Group Communication using ACE (Text)">plain text</a></td>
48
-
<td><ahref="https://author-tools.ietf.org/api/iddiff?url_1=https://ace-wg.github.io/ace-key-groupcomm/draft-ietf-ace-key-groupcomm.txt&url_2=https://ace-wg.github.io/ace-key-groupcomm/warren-kumari-review/draft-ietf-ace-key-groupcomm.txt" class="diff draft-ietf-ace-key-groupcomm">diff with master</a></td>
48
+
<td>same as master</td>
49
49
</tr>
50
50
</table>
51
51
<h2>Preview for branch <ahref="iana-reviews">iana-reviews</a></h2>
@@ -69,7 +69,7 @@ <h2>Preview for branch <a href="martin-duke-review">martin-duke-review</a></h2>
69
69
<tr>
70
70
<td><ahref="martin-duke-review/draft-ietf-ace-key-groupcomm.html" class="html draft-ietf-ace-key-groupcomm" title="Key Provisioning for Group Communication using ACE (HTML)">Key Provisioning for Group Communication</a></td>
71
71
<td><ahref="martin-duke-review/draft-ietf-ace-key-groupcomm.txt" class="txt draft-ietf-ace-key-groupcomm" title="Key Provisioning for Group Communication using ACE (Text)">plain text</a></td>
72
-
<td>same as master</td>
72
+
<td><ahref="https://author-tools.ietf.org/api/iddiff?url_1=https://ace-wg.github.io/ace-key-groupcomm/draft-ietf-ace-key-groupcomm.txt&url_2=https://ace-wg.github.io/ace-key-groupcomm/martin-duke-review/draft-ietf-ace-key-groupcomm.txt" class="diff draft-ietf-ace-key-groupcomm">diff with master</a></td>
73
73
</tr>
74
74
</table>
75
75
<h2>Preview for branch <ahref="erik-kline-review">erik-kline-review</a></h2>
0 commit comments