Skip to content

Commit

Permalink
If KUDOS is not ran with margin, msg exchanges may need to be aborted
Browse files Browse the repository at this point in the history
  • Loading branch information
rikard-sics committed Sep 27, 2024
1 parent 968d421 commit 0998c2d
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion draft-ietf-core-oscore-key-update.md
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ Two peers communicating using OSCORE may choose to renew their shared keying inf

In addition to approaching the key usage limits, there may be other reasons for a peer to initiate a key update procedure. These include: the OSCORE Security Context approaching its expiration time; application policies prescribing a regular key rollover; approaching the exhaustion of the Sender Sequence Number space in the OSCORE Sender Context.

It is RECOMMENDED that the peer initiating the key update procedure starts it with some margin, i.e., well before actually experiencing the trigger event forcing to perform a key update, e.g., the OSCORE Security Context expiration or the exhaustion of the Sender Sequence Number space. If the rekeying is not initiated ahead of these events, it may become practically impossible to perform a key update with certain methods.
It is RECOMMENDED that the peer initiating the key update procedure starts it with some margin, i.e., well before actually experiencing the trigger event forcing to perform a key update, e.g., the OSCORE Security Context expiration or the exhaustion of the Sender Sequence Number space. If the rekeying is not initiated ahead of these events, it may become practically impossible to perform a key update with certain methods, and/or without aborting ongoing message exchanges.

Other specifications define a number of ways for rekeying OSCORE, as summarized below.

Expand Down

0 comments on commit 0998c2d

Please sign in to comment.