Skip to content

Commit

Permalink
Explain why Appendix B.2 is secure while not including PIV in responses
Browse files Browse the repository at this point in the history
  • Loading branch information
rikard-sics committed Sep 27, 2024
1 parent a4a3433 commit 251cce0
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions draft-ietf-core-oscore-key-update.md
Original file line number Diff line number Diff line change
Expand Up @@ -173,9 +173,9 @@ Even when any of the alternatives mentioned above is available, it is RECOMMENDE
The protection of CoAP responses with OSCORE is updated, by adding the following text at the end of step 3 of {{Section 8.3 of RFC8613}}.

{:quote}
> If the server is using a different Security Context for the response compared to what was used to verify the request (e.g., due to an occurred key update), then the server MUST take the second alternative. That is, the server MUST include its Sender Sequence Number as Partial IV in the response and use it to build the AEAD nonce to protect the response.
> This prevents the server from using the same AEAD (key, nonce) pair for two responses, protected with different OSCORE Security Contexts.
>
> This prevents the server from using the same AEAD (key, nonce) pair for two responses, protected with different OSCORE Security Contexts. An exception is the procedure in {{Section B.2 of RFC8613}}, which is secure although not complying with the above.
> An exception is the procedure in {{Section B.2 of RFC8613}}, which is secure although not complying with the above. The reason is that, in that procedure, the server uses the new OSCORE Security Context only and solely to protect the outgoing response (response #1), and no other message is protected with that OSCORE Security Context. Other procedures where that holds would also remain secure.

# Key Update for OSCORE (KUDOS) # {#sec-rekeying-method}

Expand Down

0 comments on commit 251cce0

Please sign in to comment.