From nobody Tue Feb 2 00:54:56 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C24A3A188A for ; Tue, 2 Feb 2021 00:54:54 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.898 X-Spam-Level: X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c7VUouboarxi for ; Tue, 2 Feb 2021 00:54:52 -0800 (PST) Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 232513A1889 for ; Tue, 2 Feb 2021 00:54:51 -0800 (PST) X-IronPort-AV: E=Sophos;i="5.79,394,1602540000"; d="scan'208,217";a="490335071" Received: from adsl-46-161-92090.crnagora.net (HELO [192.168.100.4]) ([46.161.92.90]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/AES256-GCM-SHA384; 02 Feb 2021 09:54:46 +0100 User-Agent: Microsoft-MacOutlook/10.11.0.180909 Date: Tue, 02 Feb 2021 09:54:40 +0100 From: =?UTF-8?B?TWFsacWhYQ==?= =?UTF-8?B?IFZ1xI1pbmnEhw==?= To: "lake@ietf.org" Message-ID: Thread-Topic: LAKE virtual interim, January 28th 2021: Minutes Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3695104486_290527489" Archived-At: Subject: [Lake] LAKE virtual interim, January 28th 2021: Minutes X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 02 Feb 2021 08:54:54 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3695104486_290527489 Content-type: text/plain; charset="UTF-8" Content-transfer-encoding: quoted-printable Hi all, =20 Thanks everyone for attending the virtual interim last Thursday. We have no= w uploaded the minutes [1] and the recording is available [2]. Please send a= ny corrections of the minutes to the chairs at lake-chairs@ietf.org.=20 =20 A big thanks to our notetakers, Timothy Claeys and G=C3=B6ran Selander! =20 I copy-paste here the action points agreed at the meeting: AP1: John Mattsson or Karthik Bhargavan to start a thread on the target sec= urity level for different cipher suites AP2: Rene Struik to (re)start a mail thread discussing the MTI suite topic AP3: G=C3=B6ran Selander to send an email to IOTOPS on categories of diagnostic= messages =20 The next meeting will take place as part of the IETF-110 meeting, we are st= ill waiting for the agenda to be published and finalized. In the meantime, l= et=E2=80=99s continue the productive discussion on the Github and on the list! =20 Mali=C5=A1a and Stephen =20 [1] https://datatracker.ietf.org/meeting/interim-2021-lake-01/materials/min= utes-interim-2021-lake-01-202101281700-00=20 [2] https://www.youtube.com/watch?v=3Do8-k3Q_hozQ =20 --B_3695104486_290527489 Content-type: text/html; charset="UTF-8" Content-transfer-encoding: quoted-printable = --B_3695104486_290527489-- From nobody Sat Feb 6 12:34:56 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD5E43A2BB6; Sat, 6 Feb 2021 12:34:49 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id riY4JDFF2Tca; Sat, 6 Feb 2021 12:34:47 -0800 (PST) Received: from gabriel-vm-2.zfn.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BA103A2BB5; Sat, 6 Feb 2021 12:34:46 -0800 (PST) Received: from [192.168.217.152] (p5089a828.dip0.t-ipconnect.de [80.137.168.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-vm-2.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4DY3NM4MKPzyXT; Sat, 6 Feb 2021 21:12:03 +0100 (CET) From: Carsten Bormann Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\)) Date: Sat, 6 Feb 2021 21:12:03 +0100 Message-Id: <8E6100D2-605D-400D-B730-A40084C5B1A1@tzi.org> To: suit@ietf.org, teep@ietf.org, din@irtf.org, rats@ietf.org, lake@ietf.org X-Mailer: Apple Mail (2.3654.60.0.2.21) Archived-At: Subject: [Lake] Constrained Node/Network Cluster @ IETF110: DRAFT AGENDA X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 06 Feb 2021 20:34:50 -0000 Here is my usual eclectic condensed agenda based on the DRAFT AGENDA for IETF110. Remember that there is still quite some potential for changes. The IoT-relevant conflicts that meet the eye this time are LAKE/RATS, IOTOPS/COSE, CORE/DANISH, in order from hurtful to disastrous (ROLL/SUIT and LPWAN/RATS are probably bearable). All times *on my agenda* are in UTC (the default page is UTC+0100). https://datatracker.ietf.org/meeting/agenda-utc might be handy. Gr=C3=BC=C3=9Fe, Carsten MONDAY, March 1, 2021 1600-1800 Hackathon Kickoff Rm 1 GEN hackathon Hackathon THURSDAY, March 4, 2021 1700-1900 Technology Deep Dive Rm 1 tdd Technology Deep Dive FRIDAY, March 5, 2021 1600-1800 Hackathon Closing Rm 1 GEN hackathon Hackathon MONDAY, March 8, 2021 1200-1400 Session I Rm 1 ART dispatch Dispatch WG - Joint with ARTAREA Rm 2 IRTF irtfopen IRTF Open Meeting Rm 6 RTG raw Reliable and Available Wireless WG Rm 8 SEC emu EAP Method Update WG 1430-1530 Session II Rm 1 ART *** asdf A Semantic Definition Format for Data = and Interactions of Things WG Rm 3 IRTF panrg Path Aware Networking RG Rm 5 RTG detnet Deterministic Networking WG Rm 7 SEC mls Messaging Layer Security WG 1600-1800 Session III Rm 2 ART *** core Constrained RESTful Environments WG Rm 7 SEC tls Transport Layer Security WG Rm 8 TSV tsvwg Transport Area Working Group WG TUESDAY, March 9, 2021 1200-1400 Session I Rm 1 ART webtrans WebTransport WG Rm 3 INT 6man IPv6 Maintenance WG Rm 6 RTG bier Bit Indexed Explicit Replication WG Rm 8 SEC *** lake Lightweight Authenticated Key Exchange = WG Rm 9 SEC *** rats Remote ATtestation ProcedureS WG 1430-1530 Session II Rm 3 OPS *** iotops IOT Operations WG Rm 4 RTG babel Babel routing protocol WG Rm 5 RTG detnet Deterministic Networking WG Rm 7 SEC acme Automated Certificate Management = Environment WG Rm 8 SEC *** cose CBOR Object Signing and Encryption WG 1600-1800 Session III Rm 3 INT *** drip Drone Remote ID Protocol WG Rm 5 OPS v6ops IPv6 Operations WG Rm 8 SEC gnap Grant Negotiation and Authorization = Protocol WG WEDNESDAY, March 10, 2021 1200-1400 Session I Rm 1 ART jsonpath JSON Path WG Rm 2 INT intarea Internet Area Working Group WG Rm 3 IRTF icnrg Information-Centric Networking Rm 8 SEC privacypass Privacy Pass WG Rm 9 TSV quic QUIC WG 1430-1530 Session II Rm 4 INT *** lpwan IPv6 over Low Power Wide-Area Networks = WG Rm 5 IRTF qirg Quantum Internet Research Group Rm 6 OPS anima Autonomic Networking Integrated Model = and Approach WG Rm 8 SEC *** rats Remote ATtestation ProcedureS WG Rm 9 TSV tsvwg Transport Area Working Group WG THURSDAY, March 11, 2021 1200-1400 Session I Rm 2 INT *** 6lo IPv6 over Networks of = Resource-constrained Nodes WG Rm 3 INT add Adaptive DNS Discovery WG Rm 4 INT dnssd Extensions for Scalable DNS Service = Discovery WG - Joint with HOMENET Rm 4 INT homenet Home Networking WG - Joint with DNSSD Rm 8 SEC saag Security Area Open Meeting Rm 9 TSV tsvarea Transport Area Open Meeting 1430-1530 Session II Rm 1 ART wpack Web Packaging WG Rm 4 IRTF pearg Privacy Enhancements and Assessments = Research Group Rm 5 RTG *** roll Routing Over Low power and Lossy = networks WG Rm 6 SEC openpgp Open Specification for Pretty Good = Privacy WG Rm 7 SEC *** suit Software Updates for Internet of Things = WG 1600-1800 Session III Rm 2 INT 6man IPv6 Maintenance WG Rm 4 IRTF*** t2trg Thing-to-Thing Rm 7 RTG rtgarea Routing Area Open Meeting - Joint with = RTGWG Rm 8 SEC secdispatch Security Dispatch WG Rm 9 TSV masque Multiplexed Application Substrate over = QUIC Encryption WG FRIDAY, March 12, 2021 1200-1400 Session I Rm 1 ART *** core Constrained RESTful Environments WG Rm 3 IRTF cfrg Crypto Forum Rm 7 RTG rift Routing In Fat Trees WG Rm 8 SEC *** danish DANE AutheNtication for Iot Service = Hardening BOF 1430-1530 Session II Rm 1 ART *** cbor Concise Binary Object Representation = Maintenance and Extensions WG Rm 3 INT add Adaptive DNS Discovery WG Rm 5 IRTF maprg Measurement and Analysis for Protocols 1600-1800 Session III Rm 2 ART httpapi Building Blocks for HTTP APIs WG Rm 3 IRTF coinrg Computing in the Network Research Group Rm 7 SEC *** ace Authentication and Authorization for = Constrained Environments WG From nobody Sat Feb 6 23:30:12 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD4143AFA2C for ; Sat, 6 Feb 2021 23:30:10 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.097 X-Spam-Level: X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SUze0YByCH9i for ; Sat, 6 Feb 2021 23:30:09 -0800 (PST) Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1746A3AFA06 for ; Sat, 6 Feb 2021 23:30:09 -0800 (PST) Received: by mail-wr1-x435.google.com with SMTP id l12so13300003wry.2 for ; Sat, 06 Feb 2021 23:30:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=message-id:date:mime-version:from:to:subject; bh=xUTuJXHSj377NQSdN83wCky+rDGGQ1CyWhWUxz2CTxc=; b=Bj2dl6NeEGARrMWW4OIIn/+eO54KbdZrGhNiRj2btmwZeKSCfhq7daVtvzgsTlhlCD EQz/mbRvSr0tK2BFju/QGIrUhb6/FLwWAU7LLaYiwygVbcieoFDuyzsuxrBZ0x+yhifg +2ys+P4qOBM3pd3rifjirlDuYeqo0RplHFQO/emqFgC5oa6O1s+8pnUPhwQuZKsIIzg3 v7WTbvnLFp0jRlC61/K0OAZ2NiP3gTMIXKFIe7CprAckVi+SPy+IAa5ic2DSpqxzjvzh ak0+mEJWtChKjwFNFBAiZ3iHcfOtHysI1WuOcNm76+cbEZCzBDsn/eLiNmRk5I2T6Ugn Qr4Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:mime-version:from:to:subject; bh=xUTuJXHSj377NQSdN83wCky+rDGGQ1CyWhWUxz2CTxc=; b=fPf2tV2z08Sj5dSckK4MA+JvJfvivWiXBuCUL/INFQRCZBHo0J2pK91WVjxBD5j1cY +4etZrFOi3+f7ce6p1AnTTPQ63RsSj5sMkz4cB6mOsw/C/FD6+oEwrxIrCJMqcJqkd2F JQ+tc+oSFQZH7gdqnPbrcI16eVglChYa/QRQge0VSjQR03aWm93FWPXRldG6sGNDjkXI 8Ut3ySlV1mEiw6T00P390UJScRz2yTnz0yrQvo4GgdStVCv4iwz9x7MXUqDEFmZx7w+t R9rWTKepLzP0+MXXbiV0N1tijcxKzvSDlqmw/Evnwd0qKZl92OtV73r3Z4lFxnfsLm+a byBQ== X-Gm-Message-State: AOAM532HsfXr/KCJKqKZ6K+v8FFo389Xda+MlL8iyZnqPsZ81lVPXSYY 82u8b7EmYZpcu5+N5u+D9EkbOtHImWU= X-Google-Smtp-Source: ABdhPJwdmlDvVh67vKWBE2r8V8suudVxbUt4u2qOTY/5tMd6XZZfisTFvr4ly5BUOSnWnhxB2Xxkyw== X-Received: by 2002:adf:a554:: with SMTP id j20mr13859249wrb.148.1612683007137; Sat, 06 Feb 2021 23:30:07 -0800 (PST) Received: from basil.dsg.cs.tcd.ie ([134.226.36.138]) by smtp.gmail.com with ESMTPSA id w25sm14520355wmc.42.2021.02.06.23.30.06 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 06 Feb 2021 23:30:06 -0800 (PST) Message-ID: <601f96fe.1c69fb81.33d1f.fdab@mx.google.com> Date: Sat, 06 Feb 2021 23:30:06 -0800 (PST) Content-Type: multipart/alternative; boundary="===============0859007630241477451==" MIME-Version: 1.0 From: Webmaster via GitHub API To: lake@ietf.org Archived-At: Subject: [Lake] Weekly github digest (reqs, edhoc) X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 07 Feb 2021 07:30:11 -0000 --===============0859007630241477451== MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8"; format="flowed" Issues ------ * lake-wg/edhoc (+2/-0/=F0=9F=92=AC2) 2 issues created: - REST code for EDHOC Error Message as CoAP response (by marco-tiloca-sic= s) https://github.com/lake-wg/edhoc/issues/67=20 - Information in test vectors (by marco-tiloca-sics) https://github.com/lake-wg/edhoc/issues/66=20 2 issues received 2 new comments: - #56 Rename EDHOC-Exporter-FS (1 by gselander) https://github.com/lake-wg/edhoc/issues/56=20 - #22 Mandatory to implement cipher suite (1 by gselander) https://github.com/lake-wg/edhoc/issues/22 [LAKE interim jan 2021]=20 Repositories tracked by this digest: ----------------------------------- * https://github.com/lake-wg/reqs * https://github.com/lake-wg/edhoc --===============0859007630241477451== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Weekly github digest (reqs, edhoc)

Sunday February 07, 2021

Issues

lake-wg/edhoc (+2/-0/=F0=9F=92=AC2)

2 issues created:

2 issues received 2 new comments:

Repositories tracked by this digest:
--===============0859007630241477451==-- From nobody Thu Feb 11 00:13:29 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F8FF3A1382 for ; Thu, 11 Feb 2021 00:13:27 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.351 X-Spam-Level: X-Spam-Status: No, score=-2.351 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ftrm2Lq_28g1 for ; Thu, 11 Feb 2021 00:13:25 -0800 (PST) Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30071.outbound.protection.outlook.com [40.107.3.71]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6C2693A0DFF for ; Thu, 11 Feb 2021 00:13:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AhR8q3+JtHtdfgPNRjgvsZ257Ya3+QwNiLYE2G7cyWkV8yuAYzpP9NqcnVcRe7heOuu6Qvoz7w4LaiDmrfaTwOsp8lm8GL5lErLVeBvj7GekWs/oFss/OUx6TwQbfLJOg9lMEwsWGnLUJerks6tScd56dr97+8/Rl7G3VW/SVneavrLwVuhmESld46vQ/rNivUahax4wTc/XGgxgm7Oo/Y9DWlFB/OUYTi4UiOGudR0P/yzDi0+GJJcZ9HJVTROLW0xg0XJtyF3q03gXJGFPp8l1tvoW+QcguFg1mjM6vHMhimlTWEUf2rFwz7FfWd/LBKsmB85sTjoH3Doibebq9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uYBgA0lCSNE4AtPZ8f327ZEgMWEyisLA9kgXBRlLs2g=; b=JJS4fstGCp5H5UcI/SDeB4TRh84lnoFfJPk3cEkva2VSDfHaHdGiXPE/uGCGdtb5vj6WZ5210d82fRSya2v3aSoIOZzjuBO7oJGBudP63uijUXP3fLJLsp/hrk2qvUPa7bf5XoE/FGkEbwGK2duBPBGuFzcPNnqyitUZo5XtxEzrWo7i+vIqrHZcqfdMqZDLx2j80WZeLq36DB9f8i3oxCiuNiXzWQ3iw1kIK9ZmLFi0tY26ocVoiOdRX2gNQUm/jCDmyKw5K63CmZLytyPy1BPOtpO2cgQlwuMfzf3+AHwyXl2DVGnIpreLbsuxxH/HDlmgdPYrf5jotMzJjXdULg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uYBgA0lCSNE4AtPZ8f327ZEgMWEyisLA9kgXBRlLs2g=; b=GxwagP0So/HM6paK6QOa27qk0Hk9HKfYPdGNOmikDRQbYstOgixj78vULDE0G90nvmzk5Qc0krwMZY/qvE+pZabI7+LnT+QWUgdtxk+a9aHiKh8VdjCf/mK9hO8d3k/vLmcbuRUx+5mC8fbxCXTxSG2qBP9WfRqkf5t7Q8gCFhg= Received: from (2603:10a6:3:4b::8) by HE1PR0701MB2825.eurprd07.prod.outlook.com (2603:10a6:3:53::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.18; Thu, 11 Feb 2021 08:13:20 +0000 Received: from HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::c555:6e47:970c:1268]) by HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::c555:6e47:970c:1268%11]) with mapi id 15.20.3846.027; Thu, 11 Feb 2021 08:13:20 +0000 From: John Mattsson To: "lake@ietf.org" Thread-Topic: Security levels for EDHOC for formal verification Thread-Index: AQHXAE3CIo84kXTI0k20kQP+0TZxfg== Date: Thu, 11 Feb 2021 08:13:20 +0000 Message-ID: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> Accept-Language: en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.45.21011103 authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ericsson.com; x-originating-ip: [81.225.97.222] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: d50989d5-07b0-4a81-4052-08d8ce64e4e6 x-ms-traffictypediagnostic: HE1PR0701MB2825: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB3050.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(366004)(376002)(136003)(396003)(39860400002)(36756003)(66946007)(186003)(76116006)(86362001)(6512007)(6506007)(6916009)(26005)(71200400001)(8676002)(66556008)(6486002)(44832011)(5660300002)(2616005)(33656002)(66446008)(64756008)(8936002)(66476007)(2906002)(83380400001)(15650500001)(478600001)(316002)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: =?utf-8?B?WXdXaTB1bVo3S2hmaWRKem5mNjI2STZWeVY1aXFVU0p3OHQ1azZvY1pXSlND?= =?utf-8?B?NFFPb3YxRk10QlpFdXBpdVprLzRzZFdmdytTbXJrS0xNVVlHK3EwNndvVFVh?= =?utf-8?B?UmlUN2pNNWw2Q1lGcWxCejQxcW0raGhabWtuT1hPRlYxQ0EzOUcyV09CY0gx?= =?utf-8?B?amlVdGhLRlFVK0dENzMzUmlBb1UrWWZ6S2tON0g5d0JXSGtPWURRM1haZ3hC?= =?utf-8?B?cHJuelkySjRKSnFJYVptT0lJa0wwSU9icGFuSWpoVE9QMFdRU3d6alE4aTJP?= =?utf-8?B?SjRsb28wWlQ2VjhmR0Q5d3kyR3BPcjhObG9YQnE4UDA0ZHJkdk1ITnZFZU1H?= =?utf-8?B?MUJCM2ordTBJY2VDblExTHhOTjZ0NzAySlFiSi8yVU9lRlVpeXBpc1JPcVND?= =?utf-8?B?RGdTNEZUTDZNMktqSUNOR3NQdGJKYVdoL0djWXB5Z1VWcGNGZmRIVHFFaU1V?= =?utf-8?B?cmtPOEtIV0ZiZFRyMFZRQnMyc2U1cG1Sbit6allIWmZoN0lvTVQ1aFIzUmND?= =?utf-8?B?am5YZXh4TERIdnRLc29pSy9BOW92YmorbXlzZHYwZTR5SExOQ0xLYk1WdnQr?= =?utf-8?B?NlRzdmc1M1lzdE9Dck44WGdxSThZZUtIejNmTHovSWk5d0NNSzMxMzI1WDI5?= =?utf-8?B?Kzh5N3FrY0VHMjh6TmczVDdEdUdRTDBvSys2ZXo0WnIvT2hPckxDTkppQy82?= =?utf-8?B?NTZReldPRTlJM0hSd1JuNDM5OHFVWjJLUTNERFU2ZURVSDkwa2Y0N0I0Z29j?= =?utf-8?B?eWZJYW9Ua1VrWEJOMVllRUxTUXZybHBmMnBBbnlaMER1dDhTRmM1ajlWbEFN?= =?utf-8?B?a3oyOTJibzhpMm1DVmlGVWp1cU9VSkZ4UkpaSjMyczc4SkM0QmVybW1nSm1t?= =?utf-8?B?RFJZa01QUE5VYURkZy9NdEU4MGhlbkhDNGdJT2g5d3V4TVFTUWFNeS96R292?= =?utf-8?B?MlhwNlBxMUF4V1ViKzgwOWIzZk42djJ2OG9oMmxLSnExaU9rb1plTVBxSWlN?= =?utf-8?B?T2x1eWZpelByN0grUVZTa200MUM3d21BUzUwNlYzKzd4YzFqNnVLNVU0TkJr?= =?utf-8?B?bm5wOXdhY3FaSVNTMUJzL3hSckFualVQOXUvZ29IWXFXR09Gb2hBN0g3Y2lZ?= =?utf-8?B?QTdDQnNQamFvdzFCTlc0MzZQakNYenlQWU1ycm02QUhrOFc4YVNyeUkrenFG?= =?utf-8?B?U3NuMEJoOHFnL1U5RG1ISkFlUk1jQkVCWGUwQkZuc3ZrYjFnYWkvQUpMOWtj?= =?utf-8?B?eW1DUEdML1pETnpmbVhLVnl2eE0zOVRpYnE0d3JSRXdBYVVwUUhlc09hM1U1?= =?utf-8?B?bEo3eVVpM0ZjMUdpY0NudjQwNlBwSzBOK2dhZ2EzbkQ0aFNadmNjckJqam8x?= =?utf-8?B?U09YYUx3bUdzRUJPeXdWelZmc1F0OUwyRlNFdGdUMXlhME1nVFl1L2Mvb1Ar?= =?utf-8?B?MUw3b2lFMVBITFN2eVR0SEJFRTNMWitETWRqNURzb3YwdnRhZ3ZiemFqSWJl?= =?utf-8?B?cys2ZElPS2xkRlRWVm50YUtjbXdUa25GemZSVm9PNEZ0M0kvbXp0Z1ByQUJX?= =?utf-8?B?RXhIU1VUYnA3K0RNeVBJVWMzb1BVcHhyN0FCZ2VSWnc2M0F6dUxUUXZTeVk4?= =?utf-8?B?Q1FKdGdtY0tVaVNuY3Rpa1djclVnbHZPbXAxZkJJU1N6VDlySHg1Z2VXN3dp?= =?utf-8?B?V29lblNvNFVEbk8vWitjaXNGcEV6amlEYXAweU1zc2NhdkFacjVrOGpOWGN1?= =?utf-8?Q?tpp2RgunMrxnAVNt0QJ0U7WUmr1/q/mh+LcqfOS?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-ID: <2CF3CE3B24258145923934F8C6E2781A@eurprd07.prod.outlook.com> Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: ericsson.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: HE1PR0701MB3050.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d50989d5-07b0-4a81-4052-08d8ce64e4e6 X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2021 08:13:20.4382 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: OxTgaWd3qU9dtvyWDeWwHNY5m9Mo1NZLefdZDOPFcsHaTQQ69Rh5/O1GJEoF8FDIXe7rVS9wHCTQL1q7JZiHPp0NBWT76oDLD0bQON4ssJg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2825 Archived-At: Subject: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Feb 2021 08:13:28 -0000 SGksDQoNClRoZXJlIHdhcyBhIHJlcXVlc3QgZnJvbSBLYXJ0aGlrIHRvIGhhdmUgc3BlY2lmaWVk IHNlY3VyaXR5IGxldmVscyBmb3IgRURIT0Mgc28gdGhhdCBmb3JtYWwgdmVyaWZpY2F0aW9uIGNh biB2ZXJpZnkgb3IgZmFsc2lmeSB0aGUgY2xhaW1zLiBUaGlzIGlzIG5vdCB0cml2aWFsLiBCZWxv dyBpcyBhIGZpcnN0IHRyeS4gTGV0J3MgZGlzY3VzcyBpZiB0aGlzIGlzIGVub3VnaCBvciBpZiBt b3JlIG9yIGRpZmZlcmVudCBpbmZvcm1hdGlvbiBpcyBuZWVkZWQuDQoNClRoZSBkZXNpZ24gb2Jq ZWN0aXZlcyBvZiBFREhPQyBoYXMgYmVlbiB0byBoYXZlIGFwcHJveGltYXRseSB0aGUgc2FtZSBz ZWN1cml0eSBsZXZlbCBhcyBUTFMgd2hlbiB0aGUgc2FtZSBhbGdvcml0aG1zIGFyZSB1c2VkLCBi dXQgdG8gaGF2ZSBtdWNoIHNtYWxsZXIgbWVzc2FnZXMuIEp1c3QgbGlrZSBUTFMgSSB0aGluayB0 aGUgZXhwZWN0ZWQgc2VjdXJpdHkgbGV2ZWwgZGVwZW5kcyBoZWF2aWx5IG9uIHRoZSBjaG9zZW4g YWxnb3JpdGhtcyBhbmQgdGhlIG1ldGhvZC4gTWV0aG9kIDMgc2hvdWxkIGJlIGNvbXBhcmFibGUg d2l0aCBUTFMgMS4zIHdpdGggbXV0dWFsIGNlcnRpZmljYXRlIGJhc2VkIGF1dGhlbnRpY2F0aW9u LiBNZXRoZWQgMCBpcyBhIGJpdCB0cmlja2llciB0byBjb21wYXJlIHRvIFRMUy4NCg0KSW4gZ2Vu ZXJhbCB0aGVyZSBzaG91bGQgbm90IGJlIG11Y2ggZGlmZmVyZW5jZSBiZXR3ZWVuIEVESE9DIGFu ZCBUTFMgMS4zIHdoZW4gY2VydGlmaWNhdGUgYmFzZWQgYXV0aGVudGljYXRpb24gaXMgdXNlZC4g VGhlIGV4cG9ydGVkIGtleXMgc2hvdWxkIGJlIGEgYml0IHN0cm9uZ2VyIGFzIEVESE9DIGluY2x1 ZGUgbWVzc2FnZV8yIGFuZCB0aGUgZm9yIFN0YXRpYyBESCBhbHNvIHRoZSBwcml2YXRlIGF1dGhl bnRpY2F0aW9uIGtleXMuIFRoZSBTdGF0aWMgREggTWV0aG9kIHdpdGggNjQgYml0IHRhZ3MgZG9l cyBub3Qgb2ZmZXIgdGhlIHNhbWUgc2VjdXJpdHkgbGV2ZWwgYXMgVExTIDEuMyB3aXRoIGNlcnRp ZmljYXRlLWJhc2VkIGF1dGhlbnRpY2F0aW9uLCBidXQgc2hvdWxkIG9mZmVyIGJldHRlciBzZWN1 cml0eSB0aGFuIFRMUyAxLjMgd2l0aCBQU0sgYXV0aGVudGljYXRpb24gYW5kIHNob3J0IHRhZ3Mu DQoNCkVESE9DIGNhbiB1c2UgYWxsIGFsZ29yaXRobXMgZGVmaW5lZCBmb3IgQ09TRSAoYnV0IG1h eWJlIHlvdSB3aWxsIHJlc3RyaWN0IHlvdXIgd29yayB0bw0KdGhlIHByZS1kZWZpbmVkIGNpcGhl ciBzdWl0ZXMpLiBCZWxvdyBhcmUgdGhlIHJlbGV2YW50IGFsZ29yaXRobXMgZGVmaW5lZCBmb3Ig Q09TRS4NCg0KRURIT0MgQUVBRCBhbGdvcml0aG06DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0NCkFFUy1DQ00tMTYtNjQtMTI4DQpBRVMtQ0NNLTE2LTY0LTI1Ng0KQUVTLUNDTS02NC02NC0x MjgNCkFFUy1DQ00tNjQtNjQtMjU2DQpBRVMtQ0NNLTE2LTEyOC0xMjgNCkFFUy1DQ00tMTYtMTI4 LTI1Ng0KQUVTLUNDTS02NC0xMjgtMTI4DQpBRVMtQ0NNLTY0LTEyOC0yNTYNCkExMjhHQ00NCkEx OTJHQ00NCkEyNTZHQ00NCkNoYUNoYTIwL1BvbHkxMzA1DQoNCkVESE9DIGhhc2ggYWxnb3JpdGht DQotLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NClNIQUtFMjU2DQpTSEEtNTEyDQpTSEEtMzg0 DQpTSEFLRTEyOA0KU0hBLTUxMi8yNTYNClNIQS0yNTYNCltTSEEtMSBhbmQgU0hBLTI1Ni82NCBu b3QgYWxsb3dlZF0NCg0KRURIT0MgRUNESCBjdXJ2ZQ0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tDQpQLTI1Ng0KUC0zODQNClAtNTIxDQpYMjU1MTkNClg0NDgNCldlaTI1NTE5IChleHBlY3Rl ZCB0byBiZSByZWdpc3RlcmVkIHNvb24pDQpbRWQyNTUxOSwgRWQ0NDgsIHNlY3AyNTZrMSBhcmUg bm90IGFsbG93ZWRdIA0KDQpFREhPQyBzaWduYXR1cmUgYWxnb3JpdGhtDQotLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0NCkVTMjU2DQpFUzUxMg0KRVMzODQNCkVkRFNBDQpFUzI1NksNCg0KRURI T0Mgc2lnbmF0dXJlIGFsZ29yaXRobSBjdXJ2ZQ0KLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t DQpQLTI1NiAoRUNEU0Egb25seSkNClAtMzg0IChFQ0RTQSBvbmx5KQ0KUC01MjEgKEVDRFNBIG9u bHkpDQpFZDI1NTE5IChFZERTQSBvbmx5KQ0KRWQ0NDggKEVkRFNBIG9ubHkpDQpzZWNwMjU2azEg KEVDRFNBIG9ubHkpDQpbWDI1NTE5LCBYNDQ4IGFyZSBub3QgYWxsb3dlZF0gDQoNCihOb24tRUND IHNpZ25hdHVyZXMgYWxnb3JpdGhtcyBhcmUgc3VwcG9zZWQgdG8gYmUgYWxsb3dlZCBhcyB3ZWxs LiBJIHRoaW5rIHRoZSBkcmFmdCBuZWVkcyB0byBiZSB1cGRhdGVkLikNCg0KQmVsb3cgYXJlIHR3 byBpbml0aWFsIHdheXMgdG8gZXhwcmVzcyB0aGUgc2VjdXJpdHkgbGV2ZWwsIG9uZSBhcyBhIGZ1 bmN0aW9uIG9mIHRoZSBNZWh0b2QgYW5kIGFsZ29yaXRobXMuIFRoZSBzZWNvbmQgYXMgYSBjb21w YXJpc2lvbiB3aXRoIFRMUyAxLjMuIEluIGdlbmVyYWwsIEVESE9DIHdpdGggdGhlIHdlYWtlc3Qg b3B0aW9ucyBTSEFMTCBvZmZlciA2NC1iaXQgc2VjdXJpdHkgYWdhaW5zdCBvbi1saW5lIGF0dGFj a3MgYW5kIDEyOC1iaXQgc2VjdXJpdHkgYWdhaW5zdCBvZmYtbGluZSBhdHRhY2tzLiBJIHRoaW5r IHRoaXMgYWxpZ25zIHdpdGggVExTIDEuMy4NCg0KTGV0IG1lIGtub3cgaWYgdGhpcyBpcyBlbm91 Z2ggZm9yIHRoZSBmb3JtYWwgdmVyaWZpY2F0aW9uLCBpZiB5b3UgbmVlZCBzb21ldGhpbmcgZGlm ZmVyZW50LCBvciBpZiBzb21ldGhpbmcgaXMgbWlzc2luZy4gSXQgd291bGQgYmUgZ29vZCBpZiBz b21lYm9keSByZXZpZXdzIHRoZSBpbmZvcm1hdGlvbiBpcyB0aGlzIG1haWwuDQoNCg0KRURIT0Mg c2VjdXJpdHkgbGV2ZWxzIGZvciBkaWZmZXJlbnQgYXNwZWN0cw0KLS0tLS0tLS0tLS0tLS0tLS0t LS0tLS0tLS0tDQoNClRoZSBzZWN1cml0eSBsZXZlbCBvZiBjb25maWRlbmNpYWxpdHkgcHJvdGVj dGlvbiBhZ2FpbnN0IHBhc3NpdmUgYXR0YWNrZXJzIHNob3VsZCBiZSB0aGUga2V5IGxlbmd0aCBv ZiB0aGUgQUVBRCAoMTI4LCAxOTIsIG9yIDI1NiBiaXRzKS4NCg0KVGhlIHNlY3VyaXR5IGxlYmVs IG9mIGludGVncml0eSBwcm90ZWN0aW9uIGFuZCBjb25maWRlbnRpYWxpdHkgYWdhaW5zdCBhY3Rp dmUgYXR0YWNrZXJzIHNob3VsZCBiZSB0aGUgdGFnIGxlbmd0aCBvZiB0aGUgQUVBRCAoNjQgb3Ig MTI4IGJpdHMpDQoNClRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBpbiB0aGUgc3RhdGljIERI IG1vZGVzIGFyZSBkZXRlcm1pbmVkIGJ5IHRoZSAgdGFnIGxlbmd0aCBvZiB0aGUgQUVBRCAoNjQg b3IgMTI4IGJpdHMpDQoNClRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBpbiB0aGUgU2lnbmF0 dXJlIEtleSBtb2RlcyBhcmUgZGV0ZXJtaW5lZCBieSB0aGUgc2VjdXJpdHkgbGV2ZWwgb2YgdGhl IHNpZ25hdHVyZSBhbGdvcml0aG0gKDEyOCwgMTkyLCBvciAyNTYgYml0KQ0KDQpUaGUgaW50ZWdy aXR5IHByb3RlY3Rpb24gb2Ygc29tZSBmaWVsZHMgYXJlIGRldGVtaW5lZCBieSB0aGUgc2VjdXJp dHkgbGV2ZWwgb2YgdGhlIHNpZ25hdHVyZSBhbGdvcml0aG0gKDEyOCwgMTkyLCBvciAyNTYgYml0 KS4NCg0KDQoNCkVESE9DIHNlY3VyaXR5IGxldmVscyBjb21wYXJlZCB3aXRoIFRMUyAxLjMNCi0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KDQpNZXRob2QgMCAoMiogU2lnbmF0dXJlIEtleSAp IHNob3VsZCBvZmZlciB0aGUgc2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMgMS4zIHdpdGggdGhl IHNhbWUgYWxnb3JpdGhtcy4NCg0KMC4gKEFFUy1DQ00tMTYtNjQtMTI4LCBTSEEtMjU2LCBYMjU1 MTksIEVkRFNBLCBFZDI1NTE5KQ0KMS4gKEFFUy1DQ00tMTYtMTI4LTEyOCwgU0hBLTI1NiwgWDI1 NTE5LCBFZERTQSwgRWQyNTUxOSkNCjQuIChBMTI4R0NNLCBTSEEtMjU2LCBYMjU1MTksIEVTMjU2 LCBQLTI1NikNCjUgIChBMjU2R0NNLCBTSEEtMzg0LCBQLTM4NCwgRVMzODQsIFAtMzg0KQ0KDQoN Ck1ldGhvZCAwICgyKiBTdGF0aWMgREggS2V5ICkgaXMgYSBiaXQgdHJpY2tpZXIuDQoNCjAuIChB RVMtQ0NNLTE2LTY0LTEyOCwgU0hBLTI1NiwgWDI1NTE5LCBFZERTQSwgDQoNClRoZSBhdXRoZW50 aWNhdGlvbiBzZWN1cml0eSBsZXZlbCBoZXJlIGlzIGJvdW5kZWQgYnkgdGhlIDEyOC1iaXQgdGFn LiBTaG91bGQgb2ZmZXIgYXQgbGVhc3QgdGhlIHNhbWUgc2VjdXJpdHkgbGV2ZWwgYXMgVExTIDEu MyB3aXRoIFBTSyBhdXRoZW50aWNhdGlvbiB3aXRoIENDTV84LCBhbmQgdGhlIG90aGVyIGFsZ29y aXRobXMgdGhlIHNhbWUuDQoNCjEuIChBRVMtQ0NNLTE2LTEyOC0xMjgsIFNIQS0yNTYsIFgyNTUx OSwgRWREU0EsIEVkMjU1MTkpDQo0LiAoQTEyOEdDTSwgU0hBLTI1NiwgWDI1NTE5LCBFUzI1Niwg UC0yNTYpDQoNClNob3VsZCBib3RoIG9mZmVyIHNpbWlsYXIgc2VjdXJpdHkgbGV2ZWwgYXMgVExT IDEuMyB3aXRoIGNlcnRpZmljYXRlIGF1dGhlbnRpY2F0aW9uIGFuZCB0aGUgdGhlIG90aGVyIGFs Z29yaXRobXMgdGhlIHNhbWUuDQoNCjUJKEEyNTZHQ00sIFNIQS0zODQsIFAtMzg0LCBFUzM4NCwg UC0zODQpDQoNClRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBsZXZlbCBoZXJlIGlzIGJvdW5k ZWQgYnkgdGhlIDEyOC1iaXQgdGFnLg0KDQpDaGVlcnMsDQpKb2huDQoNCg0K From nobody Thu Feb 11 07:05:29 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B36D3A1685 for ; Thu, 11 Feb 2021 07:05:28 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.099 X-Spam-Level: X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vABORAW49V7j for ; Thu, 11 Feb 2021 07:05:26 -0800 (PST) Received: from mail-qv1-xf2f.google.com (mail-qv1-xf2f.google.com [IPv6:2607:f8b0:4864:20::f2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70E873A167D for ; Thu, 11 Feb 2021 07:05:26 -0800 (PST) Received: by mail-qv1-xf2f.google.com with SMTP id f18so2660912qvm.9 for ; Thu, 11 Feb 2021 07:05:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=to:references:from:subject:message-id:date:user-agent:mime-version :in-reply-to:content-transfer-encoding:content-language; bh=fCXP3mlXgkXPlflRcnSgKjkdKdSvhQWRaId2UwH3u/8=; b=AMTism/g0A4nHkienJtgzgAWNCeIRcWaDPLgsGYmukNYLucIPKwE+JI277mCGzBZaH q8qS7na+aRSmohBCX1gPJrksXr1xc7TO7R03hnfb15UaI90ZxrXd5PHl+K3SuamGw5Q0 lVoFT1G0tRSrt97hGRR0saQKHi2GWnwB6Qx4GZ+dVkekVgol48zTR7G9rghPINhI73ZL K/upUIDMqGoS4hp3a0xVfTqjDbPYctnrkgjx8lkuGKj46c1gae/zQHqesGGokqI2iG7Q 9obLpRQUK+6dap48N9yqafOMFxigbPvfNPJX2SSjMnSE9l/I43kho6+aJDWnNlPExz2T qiqw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:to:references:from:subject:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=fCXP3mlXgkXPlflRcnSgKjkdKdSvhQWRaId2UwH3u/8=; b=rQG0zyljA9OjWSe5mSlGomohHbyK5/CMe9WJFSH0TFN8oZOvgdbq0DeEI8jatVDaig lEAb3IrSG+2y0Ozn2iU0FJib9waT3PIweL7MS8E8csgVxzneXSTAvvPXeSQX0RJRaWfe rpzcwIp0AIm5TZMZnPON8uq9QHZb0xrn1fLnPYu10Fzc7ztJSVSWMh5D35CsU62dPuFg n55qqf63M5K2u8Ku8dAsttB1O40oOpjngbyFqhMzIT0xXEqLzpIIJsok8eE2YRw9lLte 6s+33iqfboQjD9dsP7tyh2PekUcr6BkwlA17ajRnDYfF+z/6lHSdjXKTZmFZRfUHXPBT cNmw== X-Gm-Message-State: AOAM532Ndhz/6KoNVIgeXiMWN5A2QByhzMwFBa85oGXp4bsot6aV57uo pcAnEhdzvQSNPk+5ZFVfeL3/Lgrd3+w= X-Google-Smtp-Source: ABdhPJw+zzB5SXJxxU6NWa2EtidoU4bMyD7/kK/1zdkq9k5RwmyJLxdy/UQCesKDA+GfpxHXqyZ1AA== X-Received: by 2002:ad4:52c2:: with SMTP id p2mr7894187qvs.39.1613055923751; Thu, 11 Feb 2021 07:05:23 -0800 (PST) Received: from ?IPv6:2607:fea8:8a0:1397:c8b8:8632:a802:fa0d? ([2607:fea8:8a0:1397:c8b8:8632:a802:fa0d]) by smtp.gmail.com with ESMTPSA id s129sm4166081qkh.37.2021.02.11.07.05.22 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Thu, 11 Feb 2021 07:05:23 -0800 (PST) To: John Mattsson , "lake@ietf.org" References: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> From: Rene Struik Message-ID: Date: Thu, 11 Feb 2021 10:05:20 -0500 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1 MIME-Version: 1.0 In-Reply-To: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable Content-Language: en-US Archived-At: Subject: Re: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Feb 2021 15:05:28 -0000 Hi John: Perhaps, it would be good adding ECDSA w/ SHA256 and Wei25519 to the mix = (i.e., add Wei25519 to the list "EDHOC signature algorithm curve" - see=20 [1], Suite Z). If I understand correctly, the formal analysis assumes specific=20 properties (such as - with signature schemes - existential=20 unforgeability under chosen message attack). If so and if ECDSA is=20 instantiated as specified in FIPS 186-4, this should not make a=20 difference for the analysis, compared to analyzing ECDSA w/ SHA256 and=20 P-256. One note: technically, one could use secp256k1 not just for signing, but = also for key agreement (below, this curve as only allowed for signing). Ref: [1]=20 https://datatracker.ietf.org/meeting/interim-2020-lake-04/materials/slide= s-interim-2020-lake-04-sessa-ecc-cipher-suites-01.pdf Rene On 2021-02-11 3:13 a.m., John Mattsson wrote: > Hi, > > There was a request from Karthik to have specified security levels for = EDHOC so that formal verification can verify or falsify the claims. This = is not trivial. Below is a first try. Let's discuss if this is enough or = if more or different information is needed. > > The design objectives of EDHOC has been to have approximatly the same s= ecurity level as TLS when the same algorithms are used, but to have much = smaller messages. Just like TLS I think the expected security level depen= ds heavily on the chosen algorithms and the method. Method 3 should be co= mparable with TLS 1.3 with mutual certificate based authentication. Methe= d 0 is a bit trickier to compare to TLS. > > In general there should not be much difference between EDHOC and TLS 1.= 3 when certificate based authentication is used. The exported keys should= be a bit stronger as EDHOC include message_2 and the for Static DH also = the private authentication keys. The Static DH Method with 64 bit tags do= es not offer the same security level as TLS 1.3 with certificate-based au= thentication, but should offer better security than TLS 1.3 with PSK auth= entication and short tags. > > EDHOC can use all algorithms defined for COSE (but maybe you will restr= ict your work to > the pre-defined cipher suites). Below are the relevant algorithms defin= ed for COSE. > > EDHOC AEAD algorithm: > --------------------------- > AES-CCM-16-64-128 > AES-CCM-16-64-256 > AES-CCM-64-64-128 > AES-CCM-64-64-256 > AES-CCM-16-128-128 > AES-CCM-16-128-256 > AES-CCM-64-128-128 > AES-CCM-64-128-256 > A128GCM > A192GCM > A256GCM > ChaCha20/Poly1305 > > EDHOC hash algorithm > --------------------------- > SHAKE256 > SHA-512 > SHA-384 > SHAKE128 > SHA-512/256 > SHA-256 > [SHA-1 and SHA-256/64 not allowed] > > EDHOC ECDH curve > --------------------------- > P-256 > P-384 > P-521 > X25519 > X448 > Wei25519 (expected to be registered soon) > [Ed25519, Ed448, secp256k1 are not allowed] > > EDHOC signature algorithm > --------------------------- > ES256 > ES512 > ES384 > EdDSA > ES256K > > EDHOC signature algorithm curve > --------------------------- > P-256 (ECDSA only) > P-384 (ECDSA only) > P-521 (ECDSA only) > Ed25519 (EdDSA only) > Ed448 (EdDSA only) > secp256k1 (ECDSA only) > [X25519, X448 are not allowed] > > (Non-ECC signatures algorithms are supposed to be allowed as well. I th= ink the draft needs to be updated.) > > Below are two initial ways to express the security level, one as a func= tion of the Mehtod and algorithms. The second as a comparision with TLS 1= =2E3. In general, EDHOC with the weakest options SHALL offer 64-bit secur= ity against on-line attacks and 128-bit security against off-line attacks= =2E I think this aligns with TLS 1.3. > > Let me know if this is enough for the formal verification, if you need = something different, or if something is missing. It would be good if some= body reviews the information is this mail. > > > EDHOC security levels for different aspects > --------------------------- > > The security level of confidenciality protection against passive attack= ers should be the key length of the AEAD (128, 192, or 256 bits). > > The security lebel of integrity protection and confidentiality against = active attackers should be the tag length of the AEAD (64 or 128 bits) > > The authentication security in the static DH modes are determined by th= e tag length of the AEAD (64 or 128 bits) > > The authentication security in the Signature Key modes are determined b= y the security level of the signature algorithm (128, 192, or 256 bit) > > The integrity protection of some fields are detemined by the security l= evel of the signature algorithm (128, 192, or 256 bit). > > > > EDHOC security levels compared with TLS 1.3 > --------------------------- > > Method 0 (2* Signature Key ) should offer the same security level as TL= S 1.3 with the same algorithms. > > 0. (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519) > 1. (AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519) > 4. (A128GCM, SHA-256, X25519, ES256, P-256) > 5 (A256GCM, SHA-384, P-384, ES384, P-384) > > > Method 0 (2* Static DH Key ) is a bit trickier. > > 0. (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, > > The authentication security level here is bounded by the 128-bit tag. S= hould offer at least the same security level as TLS 1.3 with PSK authenti= cation with CCM_8, and the other algorithms the same. > > 1. (AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519) > 4. (A128GCM, SHA-256, X25519, ES256, P-256) > > Should both offer similar security level as TLS 1.3 with certificate au= thentication and the the other algorithms the same. > > 5 (A256GCM, SHA-384, P-384, ES384, P-384) > > The authentication security level here is bounded by the 128-bit tag. > > Cheers, > John > > --=20 email: rstruik.ext@gmail.com | Skype: rstruik cell: +1 (647) 867-5658 | US: +1 (415) 287-3867 From nobody Thu Feb 11 08:01:19 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FAAB3A16F1 for ; Thu, 11 Feb 2021 08:01:18 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.35 X-Spam-Level: X-Spam-Status: No, score=-2.35 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OQTOa1NIzhAH for ; Thu, 11 Feb 2021 08:01:16 -0800 (PST) Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0620.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1e::620]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8453C3A16EC for ; Thu, 11 Feb 2021 08:01:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AK5hLNFvmWFahndp1Rmbva1sL5VG3h/aPtqbr3TqVE5wpzpzBuK1oWtVKWe2VyddcOgV8xXY0TmQ+ojYPbEnwD6uzdUuaynhLh8JHmO9NUlNZJwoYZsJ++g6V2tSvEx6Rg5sOv7B77iU2r1A5v11tixj/iDpdCjw9fV3dKOEbUp6Lfp7hfnz83ScDMJfYZkAkjq6rWLPQNX854BrPGp7kwgcGeKD7bFNyYRTbA0CByPoxuDbmSlOWUVo/EHVTJELqkfE8QJjh26hzK+gYV+v1V54IiFa/Lp9KL86xuVOGYwvqVFlP+2R2iL+gArHUt9jY2cvMuWLYz56ao64a724YA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KmaGZKUR86E5qEnOa5zWk8PM9atfB4LRPnFF7YFooH4=; b=DkymfsyXSjJqw/gDlJFUTXNDEVqfqSr1ML1n6x9LfQdDziVKgE1JYwI0VmyVXQ1Q/vEPaDIpqt38KauOP9Ox7TpMFmqua2DF+ctYhB2xsWpoOmFDOBykKQys8kt1JY+HCa/rXFG+bAULlO6E1UZ2o0srLgynbzw3wTYl42ZQaLrXAUWZHdOsAeNsN7lZMN3TklXuLBvzwjxy7jJqf5c353ngUpRwm18cv7brcJ5cEFQyzS49wx3q9oczFaVFnc8452nE75o+i4gGNKuSv9gMn9cyIe1FEevjPueM7tSutB5JCckZw2YSvdGvLNiDWa6OVSC0E5NiAV9ejlOm0r1QDA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KmaGZKUR86E5qEnOa5zWk8PM9atfB4LRPnFF7YFooH4=; b=DE+7wuM+enNW3wJxNdyinmaCbY09HoAD834XqFpad9hGCnzJ+CBEM4OK10PUvLbTcRN81elPKI+83fjxXytkPsrCgweS9JPUgfb385eC3BWqGM11jlFBl9NlqMPwwWXG4sA2p+WHaWOCsspLygTquDuY5LxWVBkpgw5cgaGWPs0= Received: from (2603:10a6:3:4b::8) by HE1PR07MB4362.eurprd07.prod.outlook.com (2603:10a6:7:9a::30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3825.15; Thu, 11 Feb 2021 16:01:08 +0000 Received: from HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::c555:6e47:970c:1268]) by HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::c555:6e47:970c:1268%11]) with mapi id 15.20.3846.027; Thu, 11 Feb 2021 16:01:07 +0000 From: John Mattsson To: Rene Struik , "lake@ietf.org" Thread-Topic: [Lake] Security levels for EDHOC for formal verification Thread-Index: AQHXAE3CIo84kXTI0k20kQP+0TZxfqpTDgUAgAAgWYA= Date: Thu, 11 Feb 2021 16:01:07 +0000 Message-ID: <3E4FB0B6-DB20-4072-9208-D58B1BA027A4@ericsson.com> References: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> In-Reply-To: Accept-Language: en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.45.21011103 authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=ericsson.com; x-originating-ip: [81.225.97.222] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 92805d9a-ec16-44b9-64ac-08d8cea63e62 x-ms-traffictypediagnostic: HE1PR07MB4362: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB3050.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(39860400002)(376002)(346002)(396003)(366004)(8676002)(6512007)(6506007)(53546011)(2616005)(26005)(44832011)(478600001)(966005)(186003)(316002)(110136005)(66946007)(66476007)(86362001)(36756003)(5660300002)(71200400001)(76116006)(66556008)(66446008)(64756008)(33656002)(83380400001)(2906002)(15650500001)(8936002)(6486002)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: =?utf-8?B?R2ZISUgxcGl6eGVUNlIrSXA2SmNHdEs3MkEyRko3eis0a2JKUTYzTVUxa2Zh?= =?utf-8?B?bmYzMnNuU0NFa1EyNitpNDRZMU9wS2czQ2Z3OEhYUFM2Ukk2MWk0WUFDVVpK?= =?utf-8?B?Q3BUMTh0U0dnUnkvbkJsYXI0UTdsb0MvbmxtU0RRN3JsS0hkMU1NVkNLdTZB?= =?utf-8?B?anIwTFdYSVhBZWg0dnQwWVJ1S0ZiV2wyR2cvTDhaOE0xcUtPcnQxQVVZRUl6?= =?utf-8?B?RkFoellXRUhnaDdRVS9tN05uVmM4aFJMT25qbWRJbEZZZGwwRmFUSk42S0gw?= =?utf-8?B?czkya0JBc2IxRGZKRVRvU09MLytOQVpsMkFHT3FrbFNOTkpONEsrVFlIYkQ3?= =?utf-8?B?NEI3aUdRRGZyejJQc0pQaTBxNW1kMWdCYnlab0ptR1d4SnlZdjJVRzZpbEZw?= =?utf-8?B?MXNXdWliR2lYRG16cVRkaGhtU1FjQWxEejVNc3ljaTQ2dk52aXAyWER6dzJy?= =?utf-8?B?L3lWUW1yUHlQUjc0MkJZaEQzMVM4bnVBTlBkVTlsd1BXREwxNGpUNG9XZVNL?= =?utf-8?B?emNWcm0yMU03bXowMXF6VkRLc3MzS0REMjA0NysxNnpqZEppYjdUT1RYN2Jt?= =?utf-8?B?TlhLM2o1Y3V6aFpqQVBVNnhaaXZMazNVSUkyanM4emtabTZCSG4ycWZRenlm?= =?utf-8?B?Wm1PWFo1c2YzQmpDU0pNanJXL0hIcFZXVWFjdzY3M3lVN1A2NzFUNGNRREZL?= =?utf-8?B?M0NmSS9Qd0pFV2RwbE1udGM1NVJHNUxoVWdvZ0dhRDdURXNQMEVkQ0VzSXRO?= =?utf-8?B?WHZwOVRLN2JDdG9Qc0ZZTURnZXpzM3pDaTVVZU5VOVdvZnpLS3F1SC9VaVpa?= =?utf-8?B?dFZvTjNqd0k4VHVhdWF3dWUzbFJablc5SE13dVVCSGY1ckxjOU9YcXNXRjdO?= =?utf-8?B?L2ZqTUVWTkFyZ1IrNUx0bW9PVUpwNDZoTnJYVENiTkxYVUYrbzY2UTR2Tzc0?= =?utf-8?B?OThUWmRBbFFWNnByUEZMYmprNzBUbGhqZTExVHhJVXladjFJU1JmSUJiMlFR?= =?utf-8?B?NWsrMG1Jb0lXTWZOWkV3dG1HSXhCREdZejdqS0oxbXYrcGU0cDBHT3RrZjJJ?= =?utf-8?B?UkpSMzcwL0Nnem5YWlFocnZqOXpEbHlwUDQyVVVZOXo2bkw2MjVidElKRzlS?= =?utf-8?B?SzdtejVZb0VFMlJBLzFMRFNoQjdoaE93Qy82a1QrOGV3cSs2aVptUEhySk8z?= =?utf-8?B?bzZ1Q3gvRTZ1TUxDd3JLZ1g3WU1FSXFOUS9rOFpxNlVkTkpaQlh2Skh2S2dq?= =?utf-8?B?WW5hcEhicnl0ZzVXR0NBZjBwaWdIQTRWWG9WdjFEeFowMEFkTWI1YmZxUGhY?= =?utf-8?B?LzdtVStXdlpJenN1dGRwbEhKSjMrQjZWdlh5U2pVUjdqTkdZVFpISXhOZHpj?= =?utf-8?B?MzhFaWhkMm5CWUphZHNFaHBib3d5Y0ZQU3RwQkpzS2tMZXZoRlljYVhGcllo?= =?utf-8?B?SEY4SzBjVzI0ajM3bGoyV29pbUJCVG5SOE8raXNTeUJYYTZYM2gxQTFpVkk0?= =?utf-8?B?SnRTaU0zQjlYZzBhcThFbVdQMEZ5dEw4VERnTXNzS0xOSUNjSi9lZ2xlWW5x?= =?utf-8?B?bXpVWVN1QU1rOExteStqVktZYVNmSEVGYjdUa3hPK0FwUkE2Z3d4UmpJTXht?= =?utf-8?B?ckJqUHdRMmJSNzlzNFM3c056QmtPVzdzN1dua29MODVFcmdURERWNGxTTC81?= =?utf-8?B?RFZrWk5MekxsWXA1d3dzcWNjaVFBQ0xSeHBiUTdKWFh5S09ZMUh2blR0UGZV?= =?utf-8?Q?j9d5ynbGmukTHuKnQcy6KKI5X/Zso6ae1Pf7zXZ?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: ericsson.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: HE1PR0701MB3050.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 92805d9a-ec16-44b9-64ac-08d8cea63e62 X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2021 16:01:07.7984 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: pJcj3HMx0iUWVIIJAKeD2XcBL8MRirh4r5r6+0FclP/39FaQvrH/8fK7wQBbX/qTWGDwkcg+f+TYVNqMWTwesSG3X/CkvDlheg1FQ+iJ+nI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4362 Archived-At: Subject: Re: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Feb 2021 16:01:18 -0000 SGkgUmVuZSwNCg0K77u/LS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IFJlbmUgU3Ry dWlrIDxyc3RydWlrLmV4dEBnbWFpbC5jb20+DQpEYXRlOiBUaHVyc2RheSwgMTEgRmVicnVhcnkg MjAyMSBhdCAxNjowNg0KVG86IEpvaG4gTWF0dHNzb24gPGpvaG4ubWF0dHNzb25AZXJpY3Nzb24u Y29tPiwgImxha2VAaWV0Zi5vcmciIDxsYWtlQGlldGYub3JnPg0KU3ViamVjdDogUmU6IFtMYWtl XSBTZWN1cml0eSBsZXZlbHMgZm9yIEVESE9DIGZvciBmb3JtYWwgdmVyaWZpY2F0aW9uDQoNCkhp IEpvaG46DQoNClBlcmhhcHMsIGl0IHdvdWxkIGJlIGdvb2QgYWRkaW5nIEVDRFNBIHcvIFNIQTI1 NiBhbmQgV2VpMjU1MTkgdG8gdGhlIG1peCANCihpLmUuLCBhZGQgV2VpMjU1MTkgdG8gdGhlIGxp c3QgIkVESE9DIHNpZ25hdHVyZSBhbGdvcml0aG0gY3VydmUiIC0gc2VlIA0KWzFdLCBTdWl0ZSBa KS4NCg0KW0pvaG5dIFllcywgSSBqdXN0IG1pc3NlZCB0byBhZGQgaXQgdGhlcmUuIFdlaTI1NTE5 IGlzIGV4cGVjdGVkIHRvIGJlIHN0YW5kYXJkaXplZCBmb3IgdXNlIHdpdGggRUNEU0EgaW4gQ09T RS4NCg0KSWYgSSB1bmRlcnN0YW5kIGNvcnJlY3RseSwgdGhlIGZvcm1hbCBhbmFseXNpcyBhc3N1 bWVzIHNwZWNpZmljIA0KcHJvcGVydGllcyAoc3VjaCBhcyAtIHdpdGggc2lnbmF0dXJlIHNjaGVt ZXMgLSBleGlzdGVudGlhbCANCnVuZm9yZ2VhYmlsaXR5IHVuZGVyIGNob3NlbiBtZXNzYWdlIGF0 dGFjaykuIElmIHNvIGFuZCBpZiBFQ0RTQSBpcyANCmluc3RhbnRpYXRlZCBhcyBzcGVjaWZpZWQg aW4gRklQUyAxODYtNCwgdGhpcyBzaG91bGQgbm90IG1ha2UgYSANCmRpZmZlcmVuY2UgZm9yIHRo ZSBhbmFseXNpcywgY29tcGFyZWQgdG8gYW5hbHl6aW5nIEVDRFNBIHcvIFNIQTI1NiBhbmQgDQpQ LTI1Ni4NCg0KW0pvaG5dIFRoYXQgaXMgbXkgdW5kZXJzdGFuZGluZyBhcyB3ZWxsLiBJIGFzc3Vt ZSBQLTI1NiwgRWQyNTUxOSwgc2VjcDI1NmsxLCBhbmQgV2VpMjU1MTkgbWlnaHQgYWxsIGJlIHRy ZWF0ZWQgdGhlIHNhbWUuDQoNCk9uZSBub3RlOiB0ZWNobmljYWxseSwgb25lIGNvdWxkIHVzZSBz ZWNwMjU2azEgbm90IGp1c3QgZm9yIHNpZ25pbmcsIGJ1dCANCmFsc28gZm9yIGtleSBhZ3JlZW1l bnQgKGJlbG93LCB0aGlzIGN1cnZlIGFzIG9ubHkgYWxsb3dlZCBmb3Igc2lnbmluZykuDQoNCltK b2huXSBZZXMsIGJ1dCBDT1NFIGRlY2lkZWQgdG8gc3BlY2lmeSBzZWNwMjU2azEgZm9yIEVDRFNB IG9ubHkuIEVESE9DIGlzIG5vdCBwbGFubmluZyB0byBjaGFuZ2UgdGhpcy4NCg0KUmVmOiBbMV0g DQpodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL21lZXRpbmcvaW50ZXJpbS0yMDIwLWxha2Ut MDQvbWF0ZXJpYWxzL3NsaWRlcy1pbnRlcmltLTIwMjAtbGFrZS0wNC1zZXNzYS1lY2MtY2lwaGVy LXN1aXRlcy0wMS5wZGYNCg0KUmVuZQ0KDQpPbiAyMDIxLTAyLTExIDM6MTMgYS5tLiwgSm9obiBN YXR0c3NvbiB3cm90ZToNCj4gSGksDQo+DQo+IFRoZXJlIHdhcyBhIHJlcXVlc3QgZnJvbSBLYXJ0 aGlrIHRvIGhhdmUgc3BlY2lmaWVkIHNlY3VyaXR5IGxldmVscyBmb3IgRURIT0Mgc28gdGhhdCBm b3JtYWwgdmVyaWZpY2F0aW9uIGNhbiB2ZXJpZnkgb3IgZmFsc2lmeSB0aGUgY2xhaW1zLiBUaGlz IGlzIG5vdCB0cml2aWFsLiBCZWxvdyBpcyBhIGZpcnN0IHRyeS4gTGV0J3MgZGlzY3VzcyBpZiB0 aGlzIGlzIGVub3VnaCBvciBpZiBtb3JlIG9yIGRpZmZlcmVudCBpbmZvcm1hdGlvbiBpcyBuZWVk ZWQuDQo+DQo+IFRoZSBkZXNpZ24gb2JqZWN0aXZlcyBvZiBFREhPQyBoYXMgYmVlbiB0byBoYXZl IGFwcHJveGltYXRseSB0aGUgc2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMgd2hlbiB0aGUgc2Ft ZSBhbGdvcml0aG1zIGFyZSB1c2VkLCBidXQgdG8gaGF2ZSBtdWNoIHNtYWxsZXIgbWVzc2FnZXMu IEp1c3QgbGlrZSBUTFMgSSB0aGluayB0aGUgZXhwZWN0ZWQgc2VjdXJpdHkgbGV2ZWwgZGVwZW5k cyBoZWF2aWx5IG9uIHRoZSBjaG9zZW4gYWxnb3JpdGhtcyBhbmQgdGhlIG1ldGhvZC4gTWV0aG9k IDMgc2hvdWxkIGJlIGNvbXBhcmFibGUgd2l0aCBUTFMgMS4zIHdpdGggbXV0dWFsIGNlcnRpZmlj YXRlIGJhc2VkIGF1dGhlbnRpY2F0aW9uLiBNZXRoZWQgMCBpcyBhIGJpdCB0cmlja2llciB0byBj b21wYXJlIHRvIFRMUy4NCj4NCj4gSW4gZ2VuZXJhbCB0aGVyZSBzaG91bGQgbm90IGJlIG11Y2gg ZGlmZmVyZW5jZSBiZXR3ZWVuIEVESE9DIGFuZCBUTFMgMS4zIHdoZW4gY2VydGlmaWNhdGUgYmFz ZWQgYXV0aGVudGljYXRpb24gaXMgdXNlZC4gVGhlIGV4cG9ydGVkIGtleXMgc2hvdWxkIGJlIGEg Yml0IHN0cm9uZ2VyIGFzIEVESE9DIGluY2x1ZGUgbWVzc2FnZV8yIGFuZCB0aGUgZm9yIFN0YXRp YyBESCBhbHNvIHRoZSBwcml2YXRlIGF1dGhlbnRpY2F0aW9uIGtleXMuIFRoZSBTdGF0aWMgREgg TWV0aG9kIHdpdGggNjQgYml0IHRhZ3MgZG9lcyBub3Qgb2ZmZXIgdGhlIHNhbWUgc2VjdXJpdHkg bGV2ZWwgYXMgVExTIDEuMyB3aXRoIGNlcnRpZmljYXRlLWJhc2VkIGF1dGhlbnRpY2F0aW9uLCBi dXQgc2hvdWxkIG9mZmVyIGJldHRlciBzZWN1cml0eSB0aGFuIFRMUyAxLjMgd2l0aCBQU0sgYXV0 aGVudGljYXRpb24gYW5kIHNob3J0IHRhZ3MuDQo+DQo+IEVESE9DIGNhbiB1c2UgYWxsIGFsZ29y aXRobXMgZGVmaW5lZCBmb3IgQ09TRSAoYnV0IG1heWJlIHlvdSB3aWxsIHJlc3RyaWN0IHlvdXIg d29yayB0bw0KPiB0aGUgcHJlLWRlZmluZWQgY2lwaGVyIHN1aXRlcykuIEJlbG93IGFyZSB0aGUg cmVsZXZhbnQgYWxnb3JpdGhtcyBkZWZpbmVkIGZvciBDT1NFLg0KPg0KPiBFREhPQyBBRUFEIGFs Z29yaXRobToNCj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+IEFFUy1DQ00tMTYtNjQt MTI4DQo+IEFFUy1DQ00tMTYtNjQtMjU2DQo+IEFFUy1DQ00tNjQtNjQtMTI4DQo+IEFFUy1DQ00t NjQtNjQtMjU2DQo+IEFFUy1DQ00tMTYtMTI4LTEyOA0KPiBBRVMtQ0NNLTE2LTEyOC0yNTYNCj4g QUVTLUNDTS02NC0xMjgtMTI4DQo+IEFFUy1DQ00tNjQtMTI4LTI1Ng0KPiBBMTI4R0NNDQo+IEEx OTJHQ00NCj4gQTI1NkdDTQ0KPiBDaGFDaGEyMC9Qb2x5MTMwNQ0KPg0KPiBFREhPQyBoYXNoIGFs Z29yaXRobQ0KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gU0hBS0UyNTYNCj4gU0hB LTUxMg0KPiBTSEEtMzg0DQo+IFNIQUtFMTI4DQo+IFNIQS01MTIvMjU2DQo+IFNIQS0yNTYNCj4g W1NIQS0xIGFuZCBTSEEtMjU2LzY0IG5vdCBhbGxvd2VkXQ0KPg0KPiBFREhPQyBFQ0RIIGN1cnZl DQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiBQLTI1Ng0KPiBQLTM4NA0KPiBQLTUy MQ0KPiBYMjU1MTkNCj4gWDQ0OA0KPiBXZWkyNTUxOSAoZXhwZWN0ZWQgdG8gYmUgcmVnaXN0ZXJl ZCBzb29uKQ0KPiBbRWQyNTUxOSwgRWQ0NDgsIHNlY3AyNTZrMSBhcmUgbm90IGFsbG93ZWRdDQo+ DQo+IEVESE9DIHNpZ25hdHVyZSBhbGdvcml0aG0NCj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tDQo+IEVTMjU2DQo+IEVTNTEyDQo+IEVTMzg0DQo+IEVkRFNBDQo+IEVTMjU2Sw0KPg0KPiBF REhPQyBzaWduYXR1cmUgYWxnb3JpdGhtIGN1cnZlDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t LS0tLQ0KPiBQLTI1NiAoRUNEU0Egb25seSkNCj4gUC0zODQgKEVDRFNBIG9ubHkpDQo+IFAtNTIx IChFQ0RTQSBvbmx5KQ0KPiBFZDI1NTE5IChFZERTQSBvbmx5KQ0KPiBFZDQ0OCAoRWREU0Egb25s eSkNCj4gc2VjcDI1NmsxIChFQ0RTQSBvbmx5KQ0KPiBbWDI1NTE5LCBYNDQ4IGFyZSBub3QgYWxs b3dlZF0NCj4NCj4gKE5vbi1FQ0Mgc2lnbmF0dXJlcyBhbGdvcml0aG1zIGFyZSBzdXBwb3NlZCB0 byBiZSBhbGxvd2VkIGFzIHdlbGwuIEkgdGhpbmsgdGhlIGRyYWZ0IG5lZWRzIHRvIGJlIHVwZGF0 ZWQuKQ0KPg0KPiBCZWxvdyBhcmUgdHdvIGluaXRpYWwgd2F5cyB0byBleHByZXNzIHRoZSBzZWN1 cml0eSBsZXZlbCwgb25lIGFzIGEgZnVuY3Rpb24gb2YgdGhlIE1laHRvZCBhbmQgYWxnb3JpdGht cy4gVGhlIHNlY29uZCBhcyBhIGNvbXBhcmlzaW9uIHdpdGggVExTIDEuMy4gSW4gZ2VuZXJhbCwg RURIT0Mgd2l0aCB0aGUgd2Vha2VzdCBvcHRpb25zIFNIQUxMIG9mZmVyIDY0LWJpdCBzZWN1cml0 eSBhZ2FpbnN0IG9uLWxpbmUgYXR0YWNrcyBhbmQgMTI4LWJpdCBzZWN1cml0eSBhZ2FpbnN0IG9m Zi1saW5lIGF0dGFja3MuIEkgdGhpbmsgdGhpcyBhbGlnbnMgd2l0aCBUTFMgMS4zLg0KPg0KPiBM ZXQgbWUga25vdyBpZiB0aGlzIGlzIGVub3VnaCBmb3IgdGhlIGZvcm1hbCB2ZXJpZmljYXRpb24s IGlmIHlvdSBuZWVkIHNvbWV0aGluZyBkaWZmZXJlbnQsIG9yIGlmIHNvbWV0aGluZyBpcyBtaXNz aW5nLiBJdCB3b3VsZCBiZSBnb29kIGlmIHNvbWVib2R5IHJldmlld3MgdGhlIGluZm9ybWF0aW9u IGlzIHRoaXMgbWFpbC4NCj4NCj4NCj4gRURIT0Mgc2VjdXJpdHkgbGV2ZWxzIGZvciBkaWZmZXJl bnQgYXNwZWN0cw0KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4NCj4gVGhlIHNlY3Vy aXR5IGxldmVsIG9mIGNvbmZpZGVuY2lhbGl0eSBwcm90ZWN0aW9uIGFnYWluc3QgcGFzc2l2ZSBh dHRhY2tlcnMgc2hvdWxkIGJlIHRoZSBrZXkgbGVuZ3RoIG9mIHRoZSBBRUFEICgxMjgsIDE5Miwg b3IgMjU2IGJpdHMpLg0KPg0KPiBUaGUgc2VjdXJpdHkgbGViZWwgb2YgaW50ZWdyaXR5IHByb3Rl Y3Rpb24gYW5kIGNvbmZpZGVudGlhbGl0eSBhZ2FpbnN0IGFjdGl2ZSBhdHRhY2tlcnMgc2hvdWxk IGJlIHRoZSB0YWcgbGVuZ3RoIG9mIHRoZSBBRUFEICg2NCBvciAxMjggYml0cykNCj4NCj4gVGhl IGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGluIHRoZSBzdGF0aWMgREggbW9kZXMgYXJlIGRldGVy bWluZWQgYnkgdGhlICB0YWcgbGVuZ3RoIG9mIHRoZSBBRUFEICg2NCBvciAxMjggYml0cykNCj4N Cj4gVGhlIGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGluIHRoZSBTaWduYXR1cmUgS2V5IG1vZGVz IGFyZSBkZXRlcm1pbmVkIGJ5IHRoZSBzZWN1cml0eSBsZXZlbCBvZiB0aGUgc2lnbmF0dXJlIGFs Z29yaXRobSAoMTI4LCAxOTIsIG9yIDI1NiBiaXQpDQo+DQo+IFRoZSBpbnRlZ3JpdHkgcHJvdGVj dGlvbiBvZiBzb21lIGZpZWxkcyBhcmUgZGV0ZW1pbmVkIGJ5IHRoZSBzZWN1cml0eSBsZXZlbCBv ZiB0aGUgc2lnbmF0dXJlIGFsZ29yaXRobSAoMTI4LCAxOTIsIG9yIDI1NiBiaXQpLg0KPg0KPg0K Pg0KPiBFREhPQyBzZWN1cml0eSBsZXZlbHMgY29tcGFyZWQgd2l0aCBUTFMgMS4zDQo+IC0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPg0KPiBNZXRob2QgMCAoMiogU2lnbmF0dXJlIEtleSAp IHNob3VsZCBvZmZlciB0aGUgc2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMgMS4zIHdpdGggdGhl IHNhbWUgYWxnb3JpdGhtcy4NCj4NCj4gMC4gKEFFUy1DQ00tMTYtNjQtMTI4LCBTSEEtMjU2LCBY MjU1MTksIEVkRFNBLCBFZDI1NTE5KQ0KPiAxLiAoQUVTLUNDTS0xNi0xMjgtMTI4LCBTSEEtMjU2 LCBYMjU1MTksIEVkRFNBLCBFZDI1NTE5KQ0KPiA0LiAoQTEyOEdDTSwgU0hBLTI1NiwgWDI1NTE5 LCBFUzI1NiwgUC0yNTYpDQo+IDUgIChBMjU2R0NNLCBTSEEtMzg0LCBQLTM4NCwgRVMzODQsIFAt Mzg0KQ0KPg0KPg0KPiBNZXRob2QgMCAoMiogU3RhdGljIERIIEtleSApIGlzIGEgYml0IHRyaWNr aWVyLg0KPg0KPiAwLiAoQUVTLUNDTS0xNi02NC0xMjgsIFNIQS0yNTYsIFgyNTUxOSwgRWREU0Es DQo+DQo+IFRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBsZXZlbCBoZXJlIGlzIGJvdW5kZWQg YnkgdGhlIDEyOC1iaXQgdGFnLiBTaG91bGQgb2ZmZXIgYXQgbGVhc3QgdGhlIHNhbWUgc2VjdXJp dHkgbGV2ZWwgYXMgVExTIDEuMyB3aXRoIFBTSyBhdXRoZW50aWNhdGlvbiB3aXRoIENDTV84LCBh bmQgdGhlIG90aGVyIGFsZ29yaXRobXMgdGhlIHNhbWUuDQo+DQo+IDEuIChBRVMtQ0NNLTE2LTEy OC0xMjgsIFNIQS0yNTYsIFgyNTUxOSwgRWREU0EsIEVkMjU1MTkpDQo+IDQuIChBMTI4R0NNLCBT SEEtMjU2LCBYMjU1MTksIEVTMjU2LCBQLTI1NikNCj4NCj4gU2hvdWxkIGJvdGggb2ZmZXIgc2lt aWxhciBzZWN1cml0eSBsZXZlbCBhcyBUTFMgMS4zIHdpdGggY2VydGlmaWNhdGUgYXV0aGVudGlj YXRpb24gYW5kIHRoZSB0aGUgb3RoZXIgYWxnb3JpdGhtcyB0aGUgc2FtZS4NCj4NCj4gNQkoQTI1 NkdDTSwgU0hBLTM4NCwgUC0zODQsIEVTMzg0LCBQLTM4NCkNCj4NCj4gVGhlIGF1dGhlbnRpY2F0 aW9uIHNlY3VyaXR5IGxldmVsIGhlcmUgaXMgYm91bmRlZCBieSB0aGUgMTI4LWJpdCB0YWcuDQo+ DQo+IENoZWVycywNCj4gSm9obg0KPg0KPg0KDQotLSANCmVtYWlsOiByc3RydWlrLmV4dEBnbWFp bC5jb20gfCBTa3lwZTogcnN0cnVpaw0KY2VsbDogKzEgKDY0NykgODY3LTU2NTggfCBVUzogKzEg KDQxNSkgMjg3LTM4NjcNCg0KDQoNCg== From nobody Thu Feb 11 08:39:49 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5FEE3A17A2 for ; Thu, 11 Feb 2021 08:39:40 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.9 X-Spam-Level: X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rj9vyyqXApqE for ; Thu, 11 Feb 2021 08:39:38 -0800 (PST) Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C5213A17D0 for ; Thu, 11 Feb 2021 08:39:34 -0800 (PST) X-IronPort-AV: E=Sophos;i="5.81,170,1610406000"; d="scan'208";a="492541682" Received: from 89-156-101-160.rev.numericable.fr (HELO [192.168.0.33]) ([89.156.101.160]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 11 Feb 2021 17:39:32 +0100 Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.40.0.2.32\)) From: Karthik Bhargavan In-Reply-To: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> Date: Thu, 11 Feb 2021 17:39:31 +0100 Cc: "lake@ietf.org" Content-Transfer-Encoding: quoted-printable Message-Id: References: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> To: John Mattsson X-Mailer: Apple Mail (2.3654.40.0.2.32) Archived-At: Subject: Re: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Feb 2021 16:39:47 -0000 Thanks John, This is useful information and provides a good basis for discussion. It is particularly interesting to see the places where you specify that = the EDHOC security guarantee is expected to meet (or exceed) TLS 1.3, because these provide clear goals we=E2=80=99d like to focus on during = formal verification. As Rene says, the proof itself relies primarily on standard crypto = assumptions about the underlying constructions, but one of the = interesting aspects of LAKE and COSE is that we are trying to minimize = message sizes (e.g. by using shorter authentication tags). It is therefore important to understand the concrete security goals in = terms of the expected security level so we can make sure that one of the = message size optimizations isn=E2=80=99t unexpectedly breaking the = security of the protocol. Conversely, known the target security level may also allow us to = identify new cryptographic optimisations that have not been considered = yet. In addition to the sizes of the crypto keys, it would also be useful to = know how many EDHOC session is an intitiator/responder expected to = participate in (per day, and over its lifetime.) How much data do we expect to send in each session? What is a reasonable compromise window for each device; e.g. would it be = ok to refresh the ECDH keys every hour, or once every day? It would be great to collect a compendium of both usage constraints like = these and concrete security targets so we can make sure the protocol = (and its recommended ciphersuite) satisfies them. Best, -Karthik > On 11 Feb 2021, at 09:13, John Mattsson = wrote: >=20 > Hi, >=20 > There was a request from Karthik to have specified security levels for = EDHOC so that formal verification can verify or falsify the claims. This = is not trivial. Below is a first try. Let's discuss if this is enough or = if more or different information is needed. >=20 > The design objectives of EDHOC has been to have approximatly the same = security level as TLS when the same algorithms are used, but to have = much smaller messages. Just like TLS I think the expected security level = depends heavily on the chosen algorithms and the method. Method 3 should = be comparable with TLS 1.3 with mutual certificate based authentication. = Methed 0 is a bit trickier to compare to TLS. >=20 > In general there should not be much difference between EDHOC and TLS = 1.3 when certificate based authentication is used. The exported keys = should be a bit stronger as EDHOC include message_2 and the for Static = DH also the private authentication keys. The Static DH Method with 64 = bit tags does not offer the same security level as TLS 1.3 with = certificate-based authentication, but should offer better security than = TLS 1.3 with PSK authentication and short tags. >=20 > EDHOC can use all algorithms defined for COSE (but maybe you will = restrict your work to > the pre-defined cipher suites). Below are the relevant algorithms = defined for COSE. >=20 > EDHOC AEAD algorithm: > --------------------------- > AES-CCM-16-64-128 > AES-CCM-16-64-256 > AES-CCM-64-64-128 > AES-CCM-64-64-256 > AES-CCM-16-128-128 > AES-CCM-16-128-256 > AES-CCM-64-128-128 > AES-CCM-64-128-256 > A128GCM > A192GCM > A256GCM > ChaCha20/Poly1305 >=20 > EDHOC hash algorithm > --------------------------- > SHAKE256 > SHA-512 > SHA-384 > SHAKE128 > SHA-512/256 > SHA-256 > [SHA-1 and SHA-256/64 not allowed] >=20 > EDHOC ECDH curve > --------------------------- > P-256 > P-384 > P-521 > X25519 > X448 > Wei25519 (expected to be registered soon) > [Ed25519, Ed448, secp256k1 are not allowed]=20 >=20 > EDHOC signature algorithm > --------------------------- > ES256 > ES512 > ES384 > EdDSA > ES256K >=20 > EDHOC signature algorithm curve > --------------------------- > P-256 (ECDSA only) > P-384 (ECDSA only) > P-521 (ECDSA only) > Ed25519 (EdDSA only) > Ed448 (EdDSA only) > secp256k1 (ECDSA only) > [X25519, X448 are not allowed]=20 >=20 > (Non-ECC signatures algorithms are supposed to be allowed as well. I = think the draft needs to be updated.) >=20 > Below are two initial ways to express the security level, one as a = function of the Mehtod and algorithms. The second as a comparision with = TLS 1.3. In general, EDHOC with the weakest options SHALL offer 64-bit = security against on-line attacks and 128-bit security against off-line = attacks. I think this aligns with TLS 1.3. >=20 > Let me know if this is enough for the formal verification, if you need = something different, or if something is missing. It would be good if = somebody reviews the information is this mail. >=20 >=20 > EDHOC security levels for different aspects > --------------------------- >=20 > The security level of confidenciality protection against passive = attackers should be the key length of the AEAD (128, 192, or 256 bits). >=20 > The security lebel of integrity protection and confidentiality against = active attackers should be the tag length of the AEAD (64 or 128 bits) >=20 > The authentication security in the static DH modes are determined by = the tag length of the AEAD (64 or 128 bits) >=20 > The authentication security in the Signature Key modes are determined = by the security level of the signature algorithm (128, 192, or 256 bit) >=20 > The integrity protection of some fields are detemined by the security = level of the signature algorithm (128, 192, or 256 bit). >=20 >=20 >=20 > EDHOC security levels compared with TLS 1.3 > --------------------------- >=20 > Method 0 (2* Signature Key ) should offer the same security level as = TLS 1.3 with the same algorithms. >=20 > 0. (AES-CCM-16-64-128, SHA-256, X25519, EdDSA, Ed25519) > 1. (AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519) > 4. (A128GCM, SHA-256, X25519, ES256, P-256) > 5 (A256GCM, SHA-384, P-384, ES384, P-384) >=20 >=20 > Method 0 (2* Static DH Key ) is a bit trickier. >=20 > 0. (AES-CCM-16-64-128, SHA-256, X25519, EdDSA,=20 >=20 > The authentication security level here is bounded by the 128-bit tag. = Should offer at least the same security level as TLS 1.3 with PSK = authentication with CCM_8, and the other algorithms the same. >=20 > 1. (AES-CCM-16-128-128, SHA-256, X25519, EdDSA, Ed25519) > 4. (A128GCM, SHA-256, X25519, ES256, P-256) >=20 > Should both offer similar security level as TLS 1.3 with certificate = authentication and the the other algorithms the same. >=20 > 5 (A256GCM, SHA-384, P-384, ES384, P-384) >=20 > The authentication security level here is bounded by the 128-bit tag. >=20 > Cheers, > John >=20 >=20 > --=20 > Lake mailing list > Lake@ietf.org > https://www.ietf.org/mailman/listinfo/lake From nobody Thu Feb 11 09:07:52 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6B2FD3A179B for ; Thu, 11 Feb 2021 09:07:50 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.351 X-Spam-Level: X-Spam-Status: No, score=-2.351 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D6cW-CjVCfN5 for ; Thu, 11 Feb 2021 09:07:48 -0800 (PST) Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2057.outbound.protection.outlook.com [40.107.22.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A1BD73A179C for ; Thu, 11 Feb 2021 09:07:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=d7R33OGCD2TIhDPCjwxW9YaItAKj5mnawkconSGxgdOd1A/2Blvdxgm7WZHowFJGqKwn6CGccVY/CNOfiERNZUYpGuiEuORVQej+E65Cq00j99tB2QCSqIpqnFakOp/DHDmb1PmHrp6jpEyYOJcffgjGckR6Sy+En8fKnlJnInX9GjXjXsJ3piRFwYF2fo1DmQQ4U9E6Kj1gKPs0JzwboCS8CGCiUSCHjIb4Nx1bcQ4Tq2XmjbOHlDU8h0LMlN8Rn/pogSBGyrfYyOUQdJ9T1gy4T6qihblAAvj7lr5r4M+Kv6KuOOcnl90bRLpQc+ey3f7wHjaZjZ5uZYkPJQ+ATw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l3S+HLFFzWRPKY3Gjk20rHcnWuLsO5OL7Ns9LB+UUVs=; b=VAUcAbEUQCbQ8GGdULcMx0+T9z1X4GIbH525WwtDxh8dZ/yM9x53ykudjITmlantsBsZnhIGr1nviRD7iVBwadIv9UrkY+SAgyJsLJHlokCiH+0xkj7UUzGI8m6HqK8jrN7HbVQ9j2g3xcKay3ADj1Fy4vKaoMTiwdoBfMMEMX5SEtcHSYev+j5aS7EOxKhB8Ou+ZX0ClQtFCSEKYuZjX2TVBTJ6vqb0ef8O3/Daf8fDO+sAxw/SLH2ruERS3lGGmnqANQpPsWkCwRBCLE6z4JO0YRwn65dyZi1N84DzHJ4Eu2u5+6veP01MB7aZ3oqev5YYmXQFHdD9WTAnALnCrw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l3S+HLFFzWRPKY3Gjk20rHcnWuLsO5OL7Ns9LB+UUVs=; b=i/Qj0o1EI0Rif5CirPLFqFJ0n/Ub/ZrbPLPig21egN6H0pCmxCj3qZRIcQB2tYcgvrYyq5vBZIBHDhrxJjLPb6yscPfnjBQBcmI16xYzZ5BZFvmBPKFJxX8RuuoRV/oh3maHIumXpdskbwQhCIZ0BzO3mObwXPbsZveTjjUmiOQ= Received: from AM6PR0702MB3669.eurprd07.prod.outlook.com (2603:10a6:209:11::19) by AM6PR07MB5829.eurprd07.prod.outlook.com (2603:10a6:20b:2a::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.11; Thu, 11 Feb 2021 17:07:45 +0000 Received: from AM6PR0702MB3669.eurprd07.prod.outlook.com ([fe80::302c:edc1:ebb6:88f4]) by AM6PR0702MB3669.eurprd07.prod.outlook.com ([fe80::302c:edc1:ebb6:88f4%2]) with mapi id 15.20.3805.032; Thu, 11 Feb 2021 17:07:45 +0000 From: =?utf-8?B?R8O2cmFuIFNlbGFuZGVy?= To: John Mattsson , "lake@ietf.org" Thread-Topic: [Lake] Security levels for EDHOC for formal verification Thread-Index: AQHXAHjuv+NCC9P2Tk+qs+3Ibr4n4Q== Date: Thu, 11 Feb 2021 17:07:45 +0000 Message-ID: <09F4C23F-955D-4543-9DEE-2754672D6147@ericsson.com> Accept-Language: en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.47.21020801 authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=ericsson.com; x-originating-ip: [83.249.67.87] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 6f045e15-3abe-4c3f-6a40-08d8ceaf8d3c x-ms-traffictypediagnostic: AM6PR07MB5829: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR0702MB3669.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(39860400002)(376002)(396003)(346002)(366004)(6486002)(478600001)(85202003)(966005)(36756003)(8676002)(110136005)(316002)(6512007)(5660300002)(66574015)(66476007)(6506007)(26005)(33656002)(86362001)(186003)(8936002)(91956017)(76116006)(66556008)(85182001)(15650500001)(71200400001)(66946007)(66446008)(2616005)(83380400001)(2906002)(64756008)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: =?utf-8?B?UEdLSUlBQzNEYmFPSXpPS0xsWlRsQjU4bTlpSXlDVzVKVnZnUXh3ZHZuYnZX?= =?utf-8?B?V2ZJWHZHNlRlc08vd01oMEFYQXAwREFjRXR0Y2NVM01BTGNyUHduMU1TSjZG?= =?utf-8?B?c1B6dkJyY2V1SW0yQ1ZacDE3aENyMXR4VStBdk54eXJzZ1ZEeEN2UXo0ZG4w?= =?utf-8?B?RFo1ckVkUnAvL1lzNXFQa3dibG5LOVo1MmVoQmdKMk90L1NpRnJvdWVjeUVh?= =?utf-8?B?eHdEME9WOUoxVEszc0JMM3R1a2JxQk53ZUF1ZW5LZEcramloNHNxNjBaN3Jp?= =?utf-8?B?WFlEZlVTZ0MwMHNhRFYzMUlBSGFOTmhxY0pzTldsSGhVbzQvRkJ3UkJsQ2Nj?= =?utf-8?B?WFg2T2ljN016SXd5U2ZtRmdZTk13WjQwMGdyMnNXbGR0ZFZtb3pQR1R2OXdX?= =?utf-8?B?K254UnRQUmt2azgzYUxZNmxKMGduNGp0dURMT2FwckxhdzRUK0ErZ1ExUjV0?= =?utf-8?B?WTR1dnpNcHdoRlBDTERmdHdJaERGRm8ySTZRcUVwZ2w2QlloWVNqc3laWEJG?= =?utf-8?B?K08vckNNV3ovcW9KdnovbWJzSnNlQnBDZ0dMT1c2bXdmUzNpL2tvQ0JoSklv?= =?utf-8?B?NHUwVHIxRmhXLzhxM2RidDI3aG1wSWR0TU1qYnY1SlE4ck1zWlZ4NTdxekxw?= =?utf-8?B?UjdlTnhNVjVqK3UvNmlnRy9XaXp5Rno1aU5tMUdicGU2VnBJbUhOdXJUR2tE?= =?utf-8?B?MWVkL0lBOFFzZDJHQUdoaVpyeXc5ZDVpRzdiYS8vL2I2b2t5ajRrZ282TGhN?= =?utf-8?B?WkZ3eHBzdUN4c29adEhiU1dDQ2p2ZkpORzQ2Y1puNjJsTnpsczAxVzU3YTNj?= =?utf-8?B?RTZpaUFIVFgyOGNXdjd4cjNLMlR2ejhvRVQ1SkRCM3FJTkxiUDVMSEwzRXFH?= =?utf-8?B?OXpzYmRWd2twWU1pWGhRL0tJa01VWnVjS013NHdHNCsyQVZTa0xrM2hhSVMx?= =?utf-8?B?MGZDWVNXcG9ROUEybWl5aGVlL2UrSW1VeEN4LzhBNHhCWkZJM0VMWVN6Y09M?= =?utf-8?B?b1BieHJzS01oSVBKVlQxaStpTmN0VFIwbTd4d2d0WWNjc2x4Qk1tNi9QK0Ju?= =?utf-8?B?a3RiSjFyclVRS1ZPMkFaeDNISTJ4My9jR1FmNUFXcU11dzk3M0VUbzh2L3Ay?= =?utf-8?B?NzgxWEFEdlRHYVpIVnFYT2JxNW5ESkJEU2JHcWVzR3oxeXh4cS9acTB5eUM0?= =?utf-8?B?QlBJbU9tWHZBaGJrSGh4SDRSRmFxKzRmQmZsR2EyUWcraWhic3FWelFja0Rq?= =?utf-8?B?UjNpbHc0WWUvcEZuTmhoOGIzSHRaMmJoZ1BUTDN2QVE2VjkrMFdxQTRnbjlI?= =?utf-8?B?ZWtEME0zeUhCNTU3b3k1QVhzNDU5V0phaWp5Y1NQWVRjekxzVU8wVXRDbFRO?= =?utf-8?B?TjMrdFRFMkJ4aVUxRjdRTFVXYlNCRFdDb0szRFNwMmpJYm9SbitBK1lEZDFr?= =?utf-8?B?MDJNVHUyN0YrZWNMRUJ3MU9ZQk85a0tlSE9QWGsvclNpKzNoaURkNUczL3Zo?= =?utf-8?B?K3NLdForQ1pkclplbjJIYnZ1cXFaWkx1Mnp3b1pwSVN1bVErS1NaK2h5Wkxh?= =?utf-8?B?NUxYTkhpTk0ra21xZ0tuR29lUW1Sc0tyZG83MDdhSkdOV3JqOW9DQjhMTk5K?= =?utf-8?B?ZFNqOTRqZFd3OFFSRzhabTZEaTFpZ1hHbmltYktPQU9BS0tsVVNIelBPZXBX?= =?utf-8?B?YXA1S2wrSG0wRUl2ekwyUnN2NSt0bjVkSGtIUTVEUlhsN21oV0REb1p0c2V2?= =?utf-8?Q?NbeHjOe1mOHN4Ic5NrXo5opEOzMmHYI0sO3w/cq?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: ericsson.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: AM6PR0702MB3669.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 6f045e15-3abe-4c3f-6a40-08d8ceaf8d3c X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2021 17:07:45.5751 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: loRQVCiuX0OJk8iaieoj03qyK5qJVY/wpmIZiKxZ5N3OwZ6imO1lyUGokg2ksfZrynpRnHduxcQ/pDbrFmobeN4chDd5ZU4lgoQAIn9ChsM= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR07MB5829 Archived-At: Subject: Re: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Feb 2021 17:07:50 -0000 SGksDQoNClNvbWUgbWlub3IgY29tbWVudHMuDQoNCjEuIFRoZXJlIGlzIGEgbWl4LXVwIHRoZSBt ZXRob2RzIGVudW1lcmF0aW9uLiANCg0KPiBNZXRob2QgMyBzaG91bGQgYmUgY29tcGFyYWJsZSB3 aXRoIFRMUyAxLjMgd2l0aCBtdXR1YWwgY2VydGlmaWNhdGUgYmFzZWQgYXV0aGVudGljYXRpb24u IE1ldGhlZCAwIGlzIGEgYml0IHRyaWNraWVyIHRvIGNvbXBhcmUgdG8gVExTLg0KDQpTaG91bGQg YmU6ICJNZXRob2QgMCBzaG91bGQgYmUgY29tcGFyYWJsZSB3aXRoIFRMUyAxLjMgd2l0aCBtdXR1 YWwgY2VydGlmaWNhdGUgYmFzZWQgYXV0aGVudGljYXRpb24uIE1ldGhvZCAzIGlzIGEgYml0IHRy aWNraWVyIHRvIGNvbXBhcmUgdG8gVExTLiINCg0KDQo+IE1ldGhvZCAwICgyKiBTdGF0aWMgREgg S2V5ICkgaXMgYSBiaXQgdHJpY2tpZXIuDQoNClNob3VsZCBiZTogTWV0aG9kIDMNCg0KDQo+IFRo ZSBleHBvcnRlZCBrZXlzIHNob3VsZCBiZSBhIGJpdCBzdHJvbmdlciBhcyBFREhPQyBpbmNsdWRl IG1lc3NhZ2VfMiBhbmQgdGhlIGZvciBTdGF0aWMgREggYWxzbyB0aGUgcHJpdmF0ZSBhdXRoZW50 aWNhdGlvbiBrZXlzLg0KDQpTaG91bGQgYmU6IG1lc3NhZ2VfMw0KDQoNCkfDtnJhbg0KDQoNCg0K DQrvu79PbiAyMDIxLTAyLTExLCAwOToxMywgIkxha2Ugb24gYmVoYWxmIG9mIEpvaG4gTWF0dHNz b24iIDxsYWtlLWJvdW5jZXNAaWV0Zi5vcmcgb24gYmVoYWxmIG9mIGpvaG4ubWF0dHNzb249NDBl cmljc3Nvbi5jb21AZG1hcmMuaWV0Zi5vcmc+IHdyb3RlOg0KDQogICAgSGksDQoNCiAgICBUaGVy ZSB3YXMgYSByZXF1ZXN0IGZyb20gS2FydGhpayB0byBoYXZlIHNwZWNpZmllZCBzZWN1cml0eSBs ZXZlbHMgZm9yIEVESE9DIHNvIHRoYXQgZm9ybWFsIHZlcmlmaWNhdGlvbiBjYW4gdmVyaWZ5IG9y IGZhbHNpZnkgdGhlIGNsYWltcy4gVGhpcyBpcyBub3QgdHJpdmlhbC4gQmVsb3cgaXMgYSBmaXJz dCB0cnkuIExldCdzIGRpc2N1c3MgaWYgdGhpcyBpcyBlbm91Z2ggb3IgaWYgbW9yZSBvciBkaWZm ZXJlbnQgaW5mb3JtYXRpb24gaXMgbmVlZGVkLg0KDQogICAgVGhlIGRlc2lnbiBvYmplY3RpdmVz IG9mIEVESE9DIGhhcyBiZWVuIHRvIGhhdmUgYXBwcm94aW1hdGx5IHRoZSBzYW1lIHNlY3VyaXR5 IGxldmVsIGFzIFRMUyB3aGVuIHRoZSBzYW1lIGFsZ29yaXRobXMgYXJlIHVzZWQsIGJ1dCB0byBo YXZlIG11Y2ggc21hbGxlciBtZXNzYWdlcy4gSnVzdCBsaWtlIFRMUyBJIHRoaW5rIHRoZSBleHBl Y3RlZCBzZWN1cml0eSBsZXZlbCBkZXBlbmRzIGhlYXZpbHkgb24gdGhlIGNob3NlbiBhbGdvcml0 aG1zIGFuZCB0aGUgbWV0aG9kLiBNZXRob2QgMyBzaG91bGQgYmUgY29tcGFyYWJsZSB3aXRoIFRM UyAxLjMgd2l0aCBtdXR1YWwgY2VydGlmaWNhdGUgYmFzZWQgYXV0aGVudGljYXRpb24uIE1ldGhl ZCAwIGlzIGEgYml0IHRyaWNraWVyIHRvIGNvbXBhcmUgdG8gVExTLg0KDQogICAgSW4gZ2VuZXJh bCB0aGVyZSBzaG91bGQgbm90IGJlIG11Y2ggZGlmZmVyZW5jZSBiZXR3ZWVuIEVESE9DIGFuZCBU TFMgMS4zIHdoZW4gY2VydGlmaWNhdGUgYmFzZWQgYXV0aGVudGljYXRpb24gaXMgdXNlZC4gVGhl IGV4cG9ydGVkIGtleXMgc2hvdWxkIGJlIGEgYml0IHN0cm9uZ2VyIGFzIEVESE9DIGluY2x1ZGUg bWVzc2FnZV8yIGFuZCB0aGUgZm9yIFN0YXRpYyBESCBhbHNvIHRoZSBwcml2YXRlIGF1dGhlbnRp Y2F0aW9uIGtleXMuIFRoZSBTdGF0aWMgREggTWV0aG9kIHdpdGggNjQgYml0IHRhZ3MgZG9lcyBu b3Qgb2ZmZXIgdGhlIHNhbWUgc2VjdXJpdHkgbGV2ZWwgYXMgVExTIDEuMyB3aXRoIGNlcnRpZmlj YXRlLWJhc2VkIGF1dGhlbnRpY2F0aW9uLCBidXQgc2hvdWxkIG9mZmVyIGJldHRlciBzZWN1cml0 eSB0aGFuIFRMUyAxLjMgd2l0aCBQU0sgYXV0aGVudGljYXRpb24gYW5kIHNob3J0IHRhZ3MuDQoN CiAgICBFREhPQyBjYW4gdXNlIGFsbCBhbGdvcml0aG1zIGRlZmluZWQgZm9yIENPU0UgKGJ1dCBt YXliZSB5b3Ugd2lsbCByZXN0cmljdCB5b3VyIHdvcmsgdG8NCiAgICB0aGUgcHJlLWRlZmluZWQg Y2lwaGVyIHN1aXRlcykuIEJlbG93IGFyZSB0aGUgcmVsZXZhbnQgYWxnb3JpdGhtcyBkZWZpbmVk IGZvciBDT1NFLg0KDQogICAgRURIT0MgQUVBRCBhbGdvcml0aG06DQogICAgLS0tLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tDQogICAgQUVTLUNDTS0xNi02NC0xMjgNCiAgICBBRVMtQ0NNLTE2LTY0 LTI1Ng0KICAgIEFFUy1DQ00tNjQtNjQtMTI4DQogICAgQUVTLUNDTS02NC02NC0yNTYNCiAgICBB RVMtQ0NNLTE2LTEyOC0xMjgNCiAgICBBRVMtQ0NNLTE2LTEyOC0yNTYNCiAgICBBRVMtQ0NNLTY0 LTEyOC0xMjgNCiAgICBBRVMtQ0NNLTY0LTEyOC0yNTYNCiAgICBBMTI4R0NNDQogICAgQTE5MkdD TQ0KICAgIEEyNTZHQ00NCiAgICBDaGFDaGEyMC9Qb2x5MTMwNQ0KDQogICAgRURIT0MgaGFzaCBh bGdvcml0aG0NCiAgICAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCiAgICBTSEFLRTI1Ng0K ICAgIFNIQS01MTINCiAgICBTSEEtMzg0DQogICAgU0hBS0UxMjgNCiAgICBTSEEtNTEyLzI1Ng0K ICAgIFNIQS0yNTYNCiAgICBbU0hBLTEgYW5kIFNIQS0yNTYvNjQgbm90IGFsbG93ZWRdDQoNCiAg ICBFREhPQyBFQ0RIIGN1cnZlDQogICAgLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQogICAg UC0yNTYNCiAgICBQLTM4NA0KICAgIFAtNTIxDQogICAgWDI1NTE5DQogICAgWDQ0OA0KICAgIFdl aTI1NTE5IChleHBlY3RlZCB0byBiZSByZWdpc3RlcmVkIHNvb24pDQogICAgW0VkMjU1MTksIEVk NDQ4LCBzZWNwMjU2azEgYXJlIG5vdCBhbGxvd2VkXSANCg0KICAgIEVESE9DIHNpZ25hdHVyZSBh bGdvcml0aG0NCiAgICAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCiAgICBFUzI1Ng0KICAg IEVTNTEyDQogICAgRVMzODQNCiAgICBFZERTQQ0KICAgIEVTMjU2Sw0KDQogICAgRURIT0Mgc2ln bmF0dXJlIGFsZ29yaXRobSBjdXJ2ZQ0KICAgIC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0K ICAgIFAtMjU2IChFQ0RTQSBvbmx5KQ0KICAgIFAtMzg0IChFQ0RTQSBvbmx5KQ0KICAgIFAtNTIx IChFQ0RTQSBvbmx5KQ0KICAgIEVkMjU1MTkgKEVkRFNBIG9ubHkpDQogICAgRWQ0NDggKEVkRFNB IG9ubHkpDQogICAgc2VjcDI1NmsxIChFQ0RTQSBvbmx5KQ0KICAgIFtYMjU1MTksIFg0NDggYXJl IG5vdCBhbGxvd2VkXSANCg0KICAgIChOb24tRUNDIHNpZ25hdHVyZXMgYWxnb3JpdGhtcyBhcmUg c3VwcG9zZWQgdG8gYmUgYWxsb3dlZCBhcyB3ZWxsLiBJIHRoaW5rIHRoZSBkcmFmdCBuZWVkcyB0 byBiZSB1cGRhdGVkLikNCg0KICAgIEJlbG93IGFyZSB0d28gaW5pdGlhbCB3YXlzIHRvIGV4cHJl c3MgdGhlIHNlY3VyaXR5IGxldmVsLCBvbmUgYXMgYSBmdW5jdGlvbiBvZiB0aGUgTWVodG9kIGFu ZCBhbGdvcml0aG1zLiBUaGUgc2Vjb25kIGFzIGEgY29tcGFyaXNpb24gd2l0aCBUTFMgMS4zLiBJ biBnZW5lcmFsLCBFREhPQyB3aXRoIHRoZSB3ZWFrZXN0IG9wdGlvbnMgU0hBTEwgb2ZmZXIgNjQt Yml0IHNlY3VyaXR5IGFnYWluc3Qgb24tbGluZSBhdHRhY2tzIGFuZCAxMjgtYml0IHNlY3VyaXR5 IGFnYWluc3Qgb2ZmLWxpbmUgYXR0YWNrcy4gSSB0aGluayB0aGlzIGFsaWducyB3aXRoIFRMUyAx LjMuDQoNCiAgICBMZXQgbWUga25vdyBpZiB0aGlzIGlzIGVub3VnaCBmb3IgdGhlIGZvcm1hbCB2 ZXJpZmljYXRpb24sIGlmIHlvdSBuZWVkIHNvbWV0aGluZyBkaWZmZXJlbnQsIG9yIGlmIHNvbWV0 aGluZyBpcyBtaXNzaW5nLiBJdCB3b3VsZCBiZSBnb29kIGlmIHNvbWVib2R5IHJldmlld3MgdGhl IGluZm9ybWF0aW9uIGlzIHRoaXMgbWFpbC4NCg0KDQogICAgRURIT0Mgc2VjdXJpdHkgbGV2ZWxz IGZvciBkaWZmZXJlbnQgYXNwZWN0cw0KICAgIC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0K DQogICAgVGhlIHNlY3VyaXR5IGxldmVsIG9mIGNvbmZpZGVuY2lhbGl0eSBwcm90ZWN0aW9uIGFn YWluc3QgcGFzc2l2ZSBhdHRhY2tlcnMgc2hvdWxkIGJlIHRoZSBrZXkgbGVuZ3RoIG9mIHRoZSBB RUFEICgxMjgsIDE5Miwgb3IgMjU2IGJpdHMpLg0KDQogICAgVGhlIHNlY3VyaXR5IGxlYmVsIG9m IGludGVncml0eSBwcm90ZWN0aW9uIGFuZCBjb25maWRlbnRpYWxpdHkgYWdhaW5zdCBhY3RpdmUg YXR0YWNrZXJzIHNob3VsZCBiZSB0aGUgdGFnIGxlbmd0aCBvZiB0aGUgQUVBRCAoNjQgb3IgMTI4 IGJpdHMpDQoNCiAgICBUaGUgYXV0aGVudGljYXRpb24gc2VjdXJpdHkgaW4gdGhlIHN0YXRpYyBE SCBtb2RlcyBhcmUgZGV0ZXJtaW5lZCBieSB0aGUgIHRhZyBsZW5ndGggb2YgdGhlIEFFQUQgKDY0 IG9yIDEyOCBiaXRzKQ0KDQogICAgVGhlIGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGluIHRoZSBT aWduYXR1cmUgS2V5IG1vZGVzIGFyZSBkZXRlcm1pbmVkIGJ5IHRoZSBzZWN1cml0eSBsZXZlbCBv ZiB0aGUgc2lnbmF0dXJlIGFsZ29yaXRobSAoMTI4LCAxOTIsIG9yIDI1NiBiaXQpDQoNCiAgICBU aGUgaW50ZWdyaXR5IHByb3RlY3Rpb24gb2Ygc29tZSBmaWVsZHMgYXJlIGRldGVtaW5lZCBieSB0 aGUgc2VjdXJpdHkgbGV2ZWwgb2YgdGhlIHNpZ25hdHVyZSBhbGdvcml0aG0gKDEyOCwgMTkyLCBv ciAyNTYgYml0KS4NCg0KDQoNCiAgICBFREhPQyBzZWN1cml0eSBsZXZlbHMgY29tcGFyZWQgd2l0 aCBUTFMgMS4zDQogICAgLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQoNCiAgICBNZXRob2Qg MCAoMiogU2lnbmF0dXJlIEtleSApIHNob3VsZCBvZmZlciB0aGUgc2FtZSBzZWN1cml0eSBsZXZl bCBhcyBUTFMgMS4zIHdpdGggdGhlIHNhbWUgYWxnb3JpdGhtcy4NCg0KICAgIDAuIChBRVMtQ0NN LTE2LTY0LTEyOCwgU0hBLTI1NiwgWDI1NTE5LCBFZERTQSwgRWQyNTUxOSkNCiAgICAxLiAoQUVT LUNDTS0xNi0xMjgtMTI4LCBTSEEtMjU2LCBYMjU1MTksIEVkRFNBLCBFZDI1NTE5KQ0KICAgIDQu IChBMTI4R0NNLCBTSEEtMjU2LCBYMjU1MTksIEVTMjU2LCBQLTI1NikNCiAgICA1ICAoQTI1NkdD TSwgU0hBLTM4NCwgUC0zODQsIEVTMzg0LCBQLTM4NCkNCg0KDQogICAgTWV0aG9kIDAgKDIqIFN0 YXRpYyBESCBLZXkgKSBpcyBhIGJpdCB0cmlja2llci4NCg0KICAgIDAuIChBRVMtQ0NNLTE2LTY0 LTEyOCwgU0hBLTI1NiwgWDI1NTE5LCBFZERTQSwgDQoNCiAgICBUaGUgYXV0aGVudGljYXRpb24g c2VjdXJpdHkgbGV2ZWwgaGVyZSBpcyBib3VuZGVkIGJ5IHRoZSAxMjgtYml0IHRhZy4gU2hvdWxk IG9mZmVyIGF0IGxlYXN0IHRoZSBzYW1lIHNlY3VyaXR5IGxldmVsIGFzIFRMUyAxLjMgd2l0aCBQ U0sgYXV0aGVudGljYXRpb24gd2l0aCBDQ01fOCwgYW5kIHRoZSBvdGhlciBhbGdvcml0aG1zIHRo ZSBzYW1lLg0KDQogICAgMS4gKEFFUy1DQ00tMTYtMTI4LTEyOCwgU0hBLTI1NiwgWDI1NTE5LCBF ZERTQSwgRWQyNTUxOSkNCiAgICA0LiAoQTEyOEdDTSwgU0hBLTI1NiwgWDI1NTE5LCBFUzI1Niwg UC0yNTYpDQoNCiAgICBTaG91bGQgYm90aCBvZmZlciBzaW1pbGFyIHNlY3VyaXR5IGxldmVsIGFz IFRMUyAxLjMgd2l0aCBjZXJ0aWZpY2F0ZSBhdXRoZW50aWNhdGlvbiBhbmQgdGhlIHRoZSBvdGhl ciBhbGdvcml0aG1zIHRoZSBzYW1lLg0KDQogICAgNQkoQTI1NkdDTSwgU0hBLTM4NCwgUC0zODQs IEVTMzg0LCBQLTM4NCkNCg0KICAgIFRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBsZXZlbCBo ZXJlIGlzIGJvdW5kZWQgYnkgdGhlIDEyOC1iaXQgdGFnLg0KDQogICAgQ2hlZXJzLA0KICAgIEpv aG4NCg0KDQogICAgLS0gDQogICAgTGFrZSBtYWlsaW5nIGxpc3QNCiAgICBMYWtlQGlldGYub3Jn DQogICAgaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9sYWtlDQoNCg== From nobody Thu Feb 11 15:08:07 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5965F3A0DEC for ; Thu, 11 Feb 2021 15:08:05 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.351 X-Spam-Level: X-Spam-Status: No, score=-2.351 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z-lHuxXFTVMr for ; Thu, 11 Feb 2021 15:08:03 -0800 (PST) Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2086.outbound.protection.outlook.com [40.107.21.86]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81E7D3A0DEB for ; Thu, 11 Feb 2021 15:08:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jkDP5lZRn/j40IW7GFSmeVe5HB/noczMvFKwearAsAMUCoYkggiROqG7S2c9X8HCq3SSGrqKpblFUei15rzNWgGyXdHAt/r8l1ugbVQc7Dz53kZ3t07/p/O8DpVBluKmqDAM0QvcLKX8RYn2+IuEbxWhRi73QfEbUaDUjts8NvI07P9iv0JQ/Zj28Bkqk5DU/CvwfosxCFoUeYDhvPxmn2mIe4uG3G6zONc2zYz54jqpVROBPrUjgoi/pBpiuWPyg7WuxJlfK6QsI5usRz+BCk8NOOOP8ytca08d2Hoyxomsq5HPXsE/FF7CH8dnwNH4ck1f6Kv6wBsOy0CtlhWXzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BZZUrPgmumbKzjFvZbqcXQlkUQJJHMHZUIxo5j63iWw=; b=cFAWSRSANqXJsIYElSPoQFl7mCspE1qC+P5G1/AGrAaK0lqOcNULdk2phbKrJHNDdEjnreYWHIDzmCo+V+NOiJzXLu8L5KZUJTOKo66r3u5hyOTjJs/avBkIArW3HTxKSaW9cqrRQ6jh7A0bstoMYyjpfF9ehily96LMwiciMlpH1pMsXcJDvDX49X+ar+zCfPCu1GvVpgw+vvFOK0j+N6WHOExGEWx1FK6UXvELztlqD3QdoqgeoywWuWg9COr+jtv9qIi2jyhRxERn0UlyWzJZ1axHPukiGs/lbCo4GRNw2SJcwqkqfkLkLRto3wlBRxuQLNey4I2NpA6immlLOQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BZZUrPgmumbKzjFvZbqcXQlkUQJJHMHZUIxo5j63iWw=; b=p9ShsEHXAPrMMcNAzwiLvh+FXeNszL/1jCC0jJPOwi1OFcEkdwLkrjCPuOgX0a6u+Vhc+lHKwhTj73llzBWdUd5VXq3Dm1ROnnt8sJE5mtI7WtRfXdi3FAwiOI5DCTWgladmrqfM627PPbjVzXn+R2l0n/nwbI5d+IeKa9MXzlA= Received: from (2603:10a6:4:74::7) by DB6PR0701MB2534.eurprd07.prod.outlook.com (2603:10a6:4:65::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.10; Thu, 11 Feb 2021 23:07:53 +0000 Received: from DB6PR0701MB3047.eurprd07.prod.outlook.com ([fe80::d905:75e:c8b9:730c]) by DB6PR0701MB3047.eurprd07.prod.outlook.com ([fe80::d905:75e:c8b9:730c%9]) with mapi id 15.20.3846.027; Thu, 11 Feb 2021 23:07:53 +0000 From: John Mattsson To: Karthik Bhargavan CC: "lake@ietf.org" Thread-Topic: [Lake] Security levels for EDHOC for formal verification Thread-Index: AQHXAE3CIo84kXTI0k20kQP+0TZxfqpTKFWAgAB9RoA= Date: Thu, 11 Feb 2021 23:07:53 +0000 Message-ID: References: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> In-Reply-To: Accept-Language: en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.45.21011103 authentication-results: inria.fr; dkim=none (message not signed) header.d=none;inria.fr; dmarc=none action=none header.from=ericsson.com; x-originating-ip: [81.225.97.222] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: d8683ac0-619e-4159-af31-08d8cee1dca6 x-ms-traffictypediagnostic: DB6PR0701MB2534: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB6PR0701MB3047.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(39860400002)(346002)(376002)(396003)(136003)(5660300002)(186003)(478600001)(26005)(66446008)(64756008)(2616005)(44832011)(91956017)(66946007)(53546011)(8676002)(66476007)(33656002)(6506007)(966005)(8936002)(6486002)(36756003)(76116006)(66556008)(30864003)(86362001)(6512007)(83380400001)(15650500001)(4326008)(316002)(6916009)(2906002)(71200400001)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: =?utf-8?B?b3dYMDd3VHRweFljU1V3V3g0S25DOCtCdFgwczczWElYWjVDUmNkSzRPVzFQ?= =?utf-8?B?UG8rem0vUFZ4aWFCU1l4RDRtdHMzQkV6M3VYell4aWxnalBhZmd0VjB3SGlk?= =?utf-8?B?cG1CL1Nodll2UXZ2OWtUeXpDOTdYWjYrZXdmeVp4ckhPSHpyTXhMOTJ3Mmk2?= =?utf-8?B?T3cwOFNuaS85UWk5d1VpdXd2b1hUclBISDlxRUtxYkNIVlZPQlNxT3NWSHN6?= =?utf-8?B?NE9RZ3pkZzU3ZUdRRFhxMTBvVGFVWU8wZzQrRXpLOXpDSGhCc0d6aE16NXRz?= =?utf-8?B?WndYNmQ5VUtBeHlQblg1cDFINTVKamhQMk8xU2cremtkdUFoMVgyYzRwNHQw?= =?utf-8?B?bHlvR0dHN3VQMk4yRUY1dU9XclFUMGk1cG1ZUTFibzFsanhGTUFRSE9VY0lW?= =?utf-8?B?S3JwREVmekJaTkJ4bDYxczNMb0JkcjdkbzdQSUl2M3FJZHlOdDBIazRRempS?= =?utf-8?B?dFY1T3Fwak5NVkRKd2N4Y3RhcUZqVEZFaW0xdlBUbm01cy9tSTQyNTBkNzB5?= =?utf-8?B?UWNpRm1yMEZFWVhpOXpsdUEvVzk0OFNTdWM1bTQ1dEtTOVlWRHhHMThFdTFC?= =?utf-8?B?blZBdnpENXpDMWNHMW9ramJqdGFkZFBSREJuN0xjaENaUlFMRU1DeGZieERW?= =?utf-8?B?ZzAvT3g0WTBTOVp2Y1hVM2VxcnRRbFdQYjV0bUNkY1U4QWEwYlBrZ2ExQjJB?= =?utf-8?B?UkZFK0VlWGtuTUtmV1dycUdrMXJVT0pMdzR5RmUzMmUySVF5bmxuZnRONjBr?= =?utf-8?B?b2dZVGY3eFVKOC9maitESHVnMFpCc2VFaFlYR2ZjazV3eExNV2ducHlST0xz?= =?utf-8?B?eVBnVWttWmF2ak5TSTljWGtrTURrb1g4VW5oRGQ5RHlhUDBIaUJRT2tydzNJ?= =?utf-8?B?ZkxYdXZld1ZBdGR2cG1PNEYrS2x1aUFlVkF2WVhNTmZQV0xUbFpsUVQveGFh?= =?utf-8?B?S3Y1cVhiUFcwVzlYK3RreUVram5RRnZVSG8rTEkyOFRWckVRNE8zS0YyNGhE?= =?utf-8?B?VFhaS1U4dldjeWFHaG5wdDJUNU1ORDByUFJkYXVFSXpsNVVmMFFHSGRZTWZR?= =?utf-8?B?OFBJdjVLSWNoUUc4T1ZLWjIyemEzSEZoeGNDL2Ixb0pxa21JK2xIellKMEpo?= =?utf-8?B?NitQSDh1YnFIUUNQVDJ5aUUzV3FKK2duSEU2ZHV3Z1o0OWlBWFRObElpTWwz?= =?utf-8?B?T0JVK21RWk9ScEpzVWFrL2kxazUrL1FQUUdZczVmNFRkQW1vZnVCZGs3clN6?= =?utf-8?B?Yno5UWFoQkNDZjJRdjhUenFSYVhxV1BMdEIyd08yV2xOYy9sRXE2cXg3RW5V?= =?utf-8?B?WGk1NG1KUzZENUQxVjQ0aGVlZmtCMTBIYXU4aDlSUG1GczdZSDlIZDd6cGJJ?= =?utf-8?B?eHhyYlBCZFpWUUplWjI1OVkxc1NoeVdDczVTOUwrM1BZQ3UyczlabENRNGpI?= =?utf-8?B?T2FRcVhqeTJTNDljN2pLL215SS9FN2E4SGlHTHBBYlhqY0NacGJHWU5zWm9P?= =?utf-8?B?TVNKWXJsNEUwNlFNK0JPTm5sQmFwUUJrZUxlTno1Y1AzTzRsQWp5bDJacU5L?= =?utf-8?B?dGE3OWdCOGg0bTFUTUV6TWsrcExZOTRLclMyanBQdVhkc2JJbzJsQ0l5bVlD?= =?utf-8?B?NnVPQ052M3lCdXczcThEQUhraGVrZ0R3aFU1V3YrVkhEODRzZzUrUllndW5y?= =?utf-8?B?THdsNkFJYy82MXVRcU4zMmtvLzN0bFBXSnZaS05oS3ZvaTBjaURKQllDNU9Q?= =?utf-8?B?MEQ1QlBFZmpXTlk2QTIycHBoSkt5c3RhVlpaZUd3MVpVK2ppaUx5ejd4NlZn?= =?utf-8?B?NmE0MXFJZzl1UkZ0NkV4UT09?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-ID: <2B168A058000CF4B92B00FCF85908DA8@eurprd07.prod.outlook.com> Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: ericsson.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DB6PR0701MB3047.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: d8683ac0-619e-4159-af31-08d8cee1dca6 X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Feb 2021 23:07:53.7260 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: S28dwYzpAgKwSflFVje6jtmkQc+7ss9pMt6lzYsg+ZRRz9vZUig330Pz0Orc7SDubKrdcBCBI4ZCNh/TMDVY47WFH0SuABZ5yIfH1YGUCQQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0701MB2534 Archived-At: Subject: Re: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Feb 2021 23:08:05 -0000 VGhhbmtzIEthcnRoaWssDQoNCj5UaGlzIGlzIHVzZWZ1bCBpbmZvcm1hdGlvbiBhbmQgcHJvdmlk ZXMgYSBnb29kIGJhc2lzIGZvciBkaXNjdXNzaW9uLg0KPkl0IGlzIHBhcnRpY3VsYXJseSBpbnRl cmVzdGluZyB0byBzZWUgdGhlIHBsYWNlcyB3aGVyZSB5b3Ugc3BlY2lmeSB0aGF0IHRoZSBFREhP QyBzZWN1cml0eSA+Z3VhcmFudGVlIGlzIGV4cGVjdGVkIHRvIG1lZXQgKG9yIGV4Y2VlZCkgVExT IDEuMywNCj5iZWNhdXNlIHRoZXNlIHByb3ZpZGUgY2xlYXIgZ29hbHMgd2XigJlkIGxpa2UgdG8g Zm9jdXMgb24gZHVyaW5nIGZvcm1hbCB2ZXJpZmljYXRpb24uDQoNCltKb2huXSBUaGF0IHNvdW5k cyBnb29kLiBJIHRoaW5rIFRMUyAxLjMgaXMgYSB2ZXJ5IGdvb2QgYmFzaXMgZm9yIGZ1cnRoZXIg ZGlzY3Vzc2lvbi4gQm90aCBUTFMgMS4zIGFuZCBFREhPQyBhcmUgYmFzZWQgb24gU0lHTUEuIElm IHRoZXJlIGlzIGEgbGFyZ2UgZGlmZmVyZW5jZSwgdGhhdCBpcyBzb21ldGhpbmcgdGhhdCB0aGUg TEFLRSBXRyBzaG91bGQgZGlzY3Vzcy4gQW5vdGhlciBkZXNpZ24gYXNwZWN0IHRoYXQgSSBjYW4g dGhpbmsgb2YgaXM6DQogLSBUTFMgMS4zIHVzZXMgbm9uY2VzIGFuZCB0aGVyZWZvcmUgbW9yZSBl bnRyb3B5LiBUTFMgMS4zIHNlY3VyaXR5IGxldmVsIGFnYWluc3QgaHVnZSBwcmUtY29tcHV0ZWQg cmFpbmJvdyB0YWJsZXMgd291bGQgYmUgaGlnaGVyIHRoYW4gRURIT0MuDQoNClRoZSBTdGF0aWMg REggYXV0aGVudGljYXRpb24gaXMgb2YgY291cnNlIHF1aXRlIGRpZmZlcmVudCBmcm9tIFRMUyAx LjMuIEkgdGhpbmsgaXQgc2hvdWxkIGhhdmUgZXF1YWwgb2YgZ3JlYXRlciBzZWN1cml0eSB0aGFu IFRMUyAxLjMgd2l0aCBQU0sgYXV0aGVudGljYXRpb24uIEVESE9DIHdpdGggU3RhdGljIERIIGF1 dGhlbnRpY2F0aW9uIHNob3VsZCBiZSBzdHJvbmdlciB0aGFuIEVESE9DIHdpdGggc2lnbmF0dXJl IGF1dGhlbnRpY2F0aW9uIGlzIHNvbWUgYXNwZWN0cyAodGhlIGtleSBkZXJpdmF0aW9uIGluY2x1 ZGVzIHRocmVlIHNoYXJlZCBzZWNyZXRzIGluc3RlYWQgb2Ygb25lIGFuZCBpdCBzaG91bGQgYmUg c3Ryb25nZXIgYWdhaW5zdCBrZXkgbGVha2FnZSksIGJ1dCB3ZWFrZXIgaW4gc29tZSBhc3BlY3Rz IGFzIHRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBpcyBib3VuZGVkIGJ5IHRoZSBBRUFEIHRh ZyBsZW5ndGguDQoNCj5BcyBSZW5lIHNheXMsIHRoZSBwcm9vZiBpdHNlbGYgcmVsaWVzIHByaW1h cmlseSBvbiBzdGFuZGFyZCBjcnlwdG8gYXNzdW1wdGlvbnMgYWJvdXQgdGhlID51bmRlcmx5aW5n IGNvbnN0cnVjdGlvbnMsIGJ1dCBvbmUgb2YgdGhlIGludGVyZXN0aW5nIGFzcGVjdHMgb2YgTEFL RSBhbmQgQ09TRSBpcyB0aGF0IHdlID5hcmUgdHJ5aW5nIHRvIG1pbmltaXplIG1lc3NhZ2Ugc2l6 ZXMgKGUuZy4gYnkgdXNpbmcgc2hvcnRlciBhdXRoZW50aWNhdGlvbiB0YWdzKS4NCj5JdCBpcyB0 aGVyZWZvcmUgaW1wb3J0YW50IHRvIHVuZGVyc3RhbmQgdGhlIGNvbmNyZXRlIHNlY3VyaXR5IGdv YWxzIGluIHRlcm1zIG9mIHRoZSA+ZXhwZWN0ZWQgc2VjdXJpdHkgbGV2ZWwgc28gd2UgY2FuIG1h a2Ugc3VyZSB0aGF0IG9uZSBvZiB0aGUgbWVzc2FnZSBzaXplIG9wdGltaXphdGlvbnMgPmlzbuKA mXQgdW5leHBlY3RlZGx5IGJyZWFraW5nIHRoZSBzZWN1cml0eSBvZiB0aGUgcHJvdG9jb2wuDQo+ Q29udmVyc2VseSwga25vd24gdGhlIHRhcmdldCBzZWN1cml0eSBsZXZlbCBtYXkgYWxzbyBhbGxv dyB1cyB0byBpZGVudGlmeSBuZXcgY3J5cHRvZ3JhcGhpYyA+b3B0aW1pc2F0aW9ucyB0aGF0IGhh dmUgbm90IGJlZW4gY29uc2lkZXJlZCB5ZXQuDQoNClllcywgbG9va2luZyBmb3J3YXJkIHRvIHlv dSByZXN1bHRzLg0KDQo+SW4gYWRkaXRpb24gdG8gdGhlIHNpemVzIG9mIHRoZSBjcnlwdG8ga2V5 cywgaXQgd291bGQgYWxzbyBiZSB1c2VmdWwgdG8ga25vdyBob3cgbWFueSBFREhPQyA+c2Vzc2lv biBpcyBhbiBpbnRpdGlhdG9yL3Jlc3BvbmRlciBleHBlY3RlZCB0byBwYXJ0aWNpcGF0ZSBpbiAo cGVyIGRheSwgYW5kIG92ZXIgaXRzID5saWZldGltZS4pDQo+SG93IG11Y2ggZGF0YSBkbyB3ZSBl eHBlY3QgdG8gc2VuZCBpbiBlYWNoIHNlc3Npb24/DQo+V2hhdCBpcyBhIHJlYXNvbmFibGUgY29t cHJvbWlzZSB3aW5kb3cgZm9yIGVhY2ggZGV2aWNlOyBlLmcuIHdvdWxkIGl0IGJlIG9rIHRvIHJl ZnJlc2ggdGhlID5FQ0RIIGtleXMgZXZlcnkgaG91ciwgb3Igb25jZSBldmVyeSBkYXk/DQoNCltK b2huXSBJIGhvcGUgdGhhdCBvdGhlciBwZW9wbGUgaW4gdGhlIFdHIGNhbiBoZWxwIG1lIGZpbGwg aW4gdGhlc2UgYXNzdW1wdGlvbnM6DQoNCi0gSSB0aGluayBhIHR5cGljYWwgZGV2aWNlIHdvdWxk IHJ1biBFREhPQyBxdWl0ZSBzZWxkb20uIEluIHRoZSBleHRyZW1lLCBhIHNlbnNvciBvciBhY3R1 YXRvciBtaWdodCBydW4gaXQgb25seSBvbmNlIGR1cmluZyBpdHMgMTAgeWVhciBsaWZldGltZSwg YnV0IG1heWJlIGEgbW9yZSByZWFzb25hYmxlIGVzdGltYXRlIGlzIGV2ZXJ5IG1vbnRoL3llYXIg d2hlbiBpdCByZWNlaXZlcyBhIGZpcm13YXJlIHVwZGF0ZT8gQSBjbG91ZCBzZXJ2ZXIgbWlnaHQg cnVuIEVESE9DIHZlcnkgdmVyeSBvZnRlbiAobWFueSB0aW1lcyBwZXIgc2Vjb25kKSB3aXRoIGRp ZmZlcm5ldCBkZXZpY2VzLg0KDQotIEkgdGhpbmsgb3RoZXIgcGVvcGxlIGluIHRoZSBncm91cCBo YXZlIG11Y2ggYmV0dGVyIGFuc3dlcnMgZm9yIGhvdyBtdWNoIGRhdGEgYW4gYXZlcmFnZSBJb1Qg ZGV2aWNlIHNlbmRzIHBlciB0aW1lIHVuaXQuDQogIEFsc28gd2hhdCBkbyB5b3UgbWVhbiBieSBz ZXNzaW9uPyBDdXJyZW50IHdvcmsgaW4gcHJvZ3Jlc3MgaXMgdGhhdCBPU0NPUkUgd2lsbCByZWtl eSBmcmVxdWVudGx5IHRvIGdldCBGUyB3aXRob3V0IHJlcnVubmlnbiB0aGUgZnVsbCBFREhPQy4g VGhpcyB3b3VsZCBiZSBzaW1pbGFyIHRvIFRMUyAxLjMgS2V5VXBkYXRlLiBBcyB0aGUgZGV0YWls cyBhcmUgbm90IGNvbXBsZXRlbHkgc3BlY2lmaWVkIHlldCwgSSBkbyBub3Qga25vdyBpZiB5b3Ug Y2FuIG1vZGVsIHRoaXMgYnV0IGFueSBjb21tZW50cyBvciBzdWdnZXN0aW9uIHdvdWxkIGJlIHZl cnkgd2VsY29tZS4NCg0KLSBXaGljaCBFQ0RIIGtleXMgZG8geW91IG1lYW4/IEVESE9DIGN1cnJl bnRseSBzdGF0ZXMgdGhhdCB0aGUgZXBoZW1lcmFsIGtleXMgTVVTVCBOT1QgYmUgcmV1c2VkIHNv IHRoZXkgYXJlIGVyYXNlZCBmcm9tIG1lbW9yeSBhZnRlciBlYWNoIHJ1bi4gVGhlIFN0YXRpYyBF Q0RIIGtleXMgdXNlZCBmb3IgRVMgRUNESCBhdXRoZW50aWNhdGlvbiB3b3VsZCB0eXBpY2FsbHkg YmUgbXVjaCBtb3JlIGxvbmcgbGl2ZWQuIEl0IGlzIGNvbW1vbiB0byB1c2UgSW9UIGF1dGhlbnRp Y2F0aW9uIGtleXMgZm9yIHRoZSBsaWZldGltZSBvZiBhIGRldmljZSwgaS5lLiwgYXJvdW5kIDEw IHllYXJzLCBidXQgcmVjZW50bHkgdGhlcmUgaGFzIGJlZW4gYSB0cmVuZCBpbiB0aGUgSFRUUFMg d29ybGQgdG8gdXNlIHNob3J0ZXIgbGlmZXRpbWVzICgxIHllYXIgaW5zdGVhZCBvZiAzIHllYXJz KS4NCg0KPkl0IHdvdWxkIGJlIGdyZWF0IHRvIGNvbGxlY3QgYSBjb21wZW5kaXVtIG9mIGJvdGgg dXNhZ2UgY29uc3RyYWludHMgbGlrZSB0aGVzZSA+YW5kIGNvbmNyZXRlIHNlY3VyaXR5IHRhcmdl dHMgc28gd2UgY2FuIG1ha2Ugc3VyZSB0aGUgcHJvdG9jb2wgKGFuZCBpdHMgPnJlY29tbWVuZGVk IGNpcGhlcnN1aXRlKSBzYXRpc2ZpZXMgdGhlbS4NCg0KW0pvaG5dIEkgZ3Vlc3Mgd2UgY2FuIHR1 cm4gdGhpcyBkaXNjdXNzaW9uIGludG8gYSBhcHBlbmRpeCBvciBzb21lIG90aGVyIGZvcm0gb2Yg ZG9jdW1lbnQgdGhhdCB5b3UgY2FuIHJlZmVyZW5jZS4NCg0KQ2hlZXJzLA0KSm9obg0KDQrvu78t LS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KRnJvbTogS2FydGhpayBCaGFyZ2F2YW4gPGthcnRo aWtleWFuLmJoYXJnYXZhbkBpbnJpYS5mcj4NCkRhdGU6IFRodXJzZGF5LCAxMSBGZWJydWFyeSAy MDIxIGF0IDE3OjQwDQpUbzogSm9obiBNYXR0c3NvbiA8am9obi5tYXR0c3NvbkBlcmljc3Nvbi5j b20+DQpDYzogImxha2VAaWV0Zi5vcmciIDxsYWtlQGlldGYub3JnPg0KU3ViamVjdDogUmU6IFtM YWtlXSBTZWN1cml0eSBsZXZlbHMgZm9yIEVESE9DIGZvciBmb3JtYWwgdmVyaWZpY2F0aW9uDQoN ClRoYW5rcyBKb2huLA0KDQpUaGlzIGlzIHVzZWZ1bCBpbmZvcm1hdGlvbiBhbmQgcHJvdmlkZXMg YSBnb29kIGJhc2lzIGZvciBkaXNjdXNzaW9uLg0KSXQgaXMgcGFydGljdWxhcmx5IGludGVyZXN0 aW5nIHRvIHNlZSB0aGUgcGxhY2VzIHdoZXJlIHlvdSBzcGVjaWZ5IHRoYXQgdGhlIEVESE9DIHNl Y3VyaXR5IGd1YXJhbnRlZSBpcyBleHBlY3RlZCB0byBtZWV0IChvciBleGNlZWQpIFRMUyAxLjMs DQpiZWNhdXNlIHRoZXNlIHByb3ZpZGUgY2xlYXIgZ29hbHMgd2XigJlkIGxpa2UgdG8gZm9jdXMg b24gZHVyaW5nIGZvcm1hbCB2ZXJpZmljYXRpb24uDQoNCkFzIFJlbmUgc2F5cywgdGhlIHByb29m IGl0c2VsZiByZWxpZXMgcHJpbWFyaWx5IG9uIHN0YW5kYXJkIGNyeXB0byBhc3N1bXB0aW9ucyBh Ym91dCB0aGUgdW5kZXJseWluZyBjb25zdHJ1Y3Rpb25zLCBidXQgb25lIG9mIHRoZSBpbnRlcmVz dGluZyBhc3BlY3RzIG9mIExBS0UgYW5kIENPU0UgaXMgdGhhdCB3ZSBhcmUgdHJ5aW5nIHRvIG1p bmltaXplIG1lc3NhZ2Ugc2l6ZXMgKGUuZy4gYnkgdXNpbmcgc2hvcnRlciBhdXRoZW50aWNhdGlv biB0YWdzKS4NCkl0IGlzIHRoZXJlZm9yZSBpbXBvcnRhbnQgdG8gdW5kZXJzdGFuZCB0aGUgY29u Y3JldGUgc2VjdXJpdHkgZ29hbHMgaW4gdGVybXMgb2YgdGhlIGV4cGVjdGVkIHNlY3VyaXR5IGxl dmVsIHNvIHdlIGNhbiBtYWtlIHN1cmUgdGhhdCBvbmUgb2YgdGhlIG1lc3NhZ2Ugc2l6ZSBvcHRp bWl6YXRpb25zIGlzbuKAmXQgdW5leHBlY3RlZGx5IGJyZWFraW5nIHRoZSBzZWN1cml0eSBvZiB0 aGUgcHJvdG9jb2wuDQpDb252ZXJzZWx5LCBrbm93biB0aGUgdGFyZ2V0IHNlY3VyaXR5IGxldmVs IG1heSBhbHNvIGFsbG93IHVzIHRvIGlkZW50aWZ5IG5ldyBjcnlwdG9ncmFwaGljIG9wdGltaXNh dGlvbnMgdGhhdCBoYXZlIG5vdCBiZWVuIGNvbnNpZGVyZWQgeWV0Lg0KDQpJbiBhZGRpdGlvbiB0 byB0aGUgc2l6ZXMgb2YgdGhlIGNyeXB0byBrZXlzLCBpdCB3b3VsZCBhbHNvIGJlIHVzZWZ1bCB0 byBrbm93IGhvdyBtYW55IEVESE9DIHNlc3Npb24gaXMgYW4gaW50aXRpYXRvci9yZXNwb25kZXIg ZXhwZWN0ZWQgdG8gcGFydGljaXBhdGUgaW4gKHBlciBkYXksIGFuZCBvdmVyIGl0cyBsaWZldGlt ZS4pDQpIb3cgbXVjaCBkYXRhIGRvIHdlIGV4cGVjdCB0byBzZW5kIGluIGVhY2ggc2Vzc2lvbj8N CldoYXQgaXMgYSByZWFzb25hYmxlIGNvbXByb21pc2Ugd2luZG93IGZvciBlYWNoIGRldmljZTsg ZS5nLiB3b3VsZCBpdCBiZSBvayB0byByZWZyZXNoIHRoZSBFQ0RIIGtleXMgZXZlcnkgaG91ciwg b3Igb25jZSBldmVyeSBkYXk/DQoNCkl0IHdvdWxkIGJlIGdyZWF0IHRvIGNvbGxlY3QgYSBjb21w ZW5kaXVtIG9mIGJvdGggdXNhZ2UgY29uc3RyYWludHMgbGlrZSB0aGVzZSBhbmQgY29uY3JldGUg c2VjdXJpdHkgdGFyZ2V0cyBzbyB3ZSBjYW4gbWFrZSBzdXJlIHRoZSBwcm90b2NvbCAoYW5kIGl0 cyByZWNvbW1lbmRlZCBjaXBoZXJzdWl0ZSkgc2F0aXNmaWVzIHRoZW0uDQoNCkJlc3QsDQotS2Fy dGhpaw0KDQoNCj4gT24gMTEgRmViIDIwMjEsIGF0IDA5OjEzLCBKb2huIE1hdHRzc29uIDxqb2hu Lm1hdHRzc29uPTQwZXJpY3Nzb24uY29tQGRtYXJjLmlldGYub3JnPiB3cm90ZToNCj4gDQo+IEhp LA0KPiANCj4gVGhlcmUgd2FzIGEgcmVxdWVzdCBmcm9tIEthcnRoaWsgdG8gaGF2ZSBzcGVjaWZp ZWQgc2VjdXJpdHkgbGV2ZWxzIGZvciBFREhPQyBzbyB0aGF0IGZvcm1hbCB2ZXJpZmljYXRpb24g Y2FuIHZlcmlmeSBvciBmYWxzaWZ5IHRoZSBjbGFpbXMuIFRoaXMgaXMgbm90IHRyaXZpYWwuIEJl bG93IGlzIGEgZmlyc3QgdHJ5LiBMZXQncyBkaXNjdXNzIGlmIHRoaXMgaXMgZW5vdWdoIG9yIGlm IG1vcmUgb3IgZGlmZmVyZW50IGluZm9ybWF0aW9uIGlzIG5lZWRlZC4NCj4gDQo+IFRoZSBkZXNp Z24gb2JqZWN0aXZlcyBvZiBFREhPQyBoYXMgYmVlbiB0byBoYXZlIGFwcHJveGltYXRseSB0aGUg c2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMgd2hlbiB0aGUgc2FtZSBhbGdvcml0aG1zIGFyZSB1 c2VkLCBidXQgdG8gaGF2ZSBtdWNoIHNtYWxsZXIgbWVzc2FnZXMuIEp1c3QgbGlrZSBUTFMgSSB0 aGluayB0aGUgZXhwZWN0ZWQgc2VjdXJpdHkgbGV2ZWwgZGVwZW5kcyBoZWF2aWx5IG9uIHRoZSBj aG9zZW4gYWxnb3JpdGhtcyBhbmQgdGhlIG1ldGhvZC4gTWV0aG9kIDMgc2hvdWxkIGJlIGNvbXBh cmFibGUgd2l0aCBUTFMgMS4zIHdpdGggbXV0dWFsIGNlcnRpZmljYXRlIGJhc2VkIGF1dGhlbnRp Y2F0aW9uLiBNZXRoZWQgMCBpcyBhIGJpdCB0cmlja2llciB0byBjb21wYXJlIHRvIFRMUy4NCj4g DQo+IEluIGdlbmVyYWwgdGhlcmUgc2hvdWxkIG5vdCBiZSBtdWNoIGRpZmZlcmVuY2UgYmV0d2Vl biBFREhPQyBhbmQgVExTIDEuMyB3aGVuIGNlcnRpZmljYXRlIGJhc2VkIGF1dGhlbnRpY2F0aW9u IGlzIHVzZWQuIFRoZSBleHBvcnRlZCBrZXlzIHNob3VsZCBiZSBhIGJpdCBzdHJvbmdlciBhcyBF REhPQyBpbmNsdWRlIG1lc3NhZ2VfMiBhbmQgdGhlIGZvciBTdGF0aWMgREggYWxzbyB0aGUgcHJp dmF0ZSBhdXRoZW50aWNhdGlvbiBrZXlzLiBUaGUgU3RhdGljIERIIE1ldGhvZCB3aXRoIDY0IGJp dCB0YWdzIGRvZXMgbm90IG9mZmVyIHRoZSBzYW1lIHNlY3VyaXR5IGxldmVsIGFzIFRMUyAxLjMg d2l0aCBjZXJ0aWZpY2F0ZS1iYXNlZCBhdXRoZW50aWNhdGlvbiwgYnV0IHNob3VsZCBvZmZlciBi ZXR0ZXIgc2VjdXJpdHkgdGhhbiBUTFMgMS4zIHdpdGggUFNLIGF1dGhlbnRpY2F0aW9uIGFuZCBz aG9ydCB0YWdzLg0KPiANCj4gRURIT0MgY2FuIHVzZSBhbGwgYWxnb3JpdGhtcyBkZWZpbmVkIGZv ciBDT1NFIChidXQgbWF5YmUgeW91IHdpbGwgcmVzdHJpY3QgeW91ciB3b3JrIHRvDQo+IHRoZSBw cmUtZGVmaW5lZCBjaXBoZXIgc3VpdGVzKS4gQmVsb3cgYXJlIHRoZSByZWxldmFudCBhbGdvcml0 aG1zIGRlZmluZWQgZm9yIENPU0UuDQo+IA0KPiBFREhPQyBBRUFEIGFsZ29yaXRobToNCj4gLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+IEFFUy1DQ00tMTYtNjQtMTI4DQo+IEFFUy1DQ00t MTYtNjQtMjU2DQo+IEFFUy1DQ00tNjQtNjQtMTI4DQo+IEFFUy1DQ00tNjQtNjQtMjU2DQo+IEFF Uy1DQ00tMTYtMTI4LTEyOA0KPiBBRVMtQ0NNLTE2LTEyOC0yNTYNCj4gQUVTLUNDTS02NC0xMjgt MTI4DQo+IEFFUy1DQ00tNjQtMTI4LTI1Ng0KPiBBMTI4R0NNDQo+IEExOTJHQ00NCj4gQTI1NkdD TQ0KPiBDaGFDaGEyMC9Qb2x5MTMwNQ0KPiANCj4gRURIT0MgaGFzaCBhbGdvcml0aG0NCj4gLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+IFNIQUtFMjU2DQo+IFNIQS01MTINCj4gU0hBLTM4 NA0KPiBTSEFLRTEyOA0KPiBTSEEtNTEyLzI1Ng0KPiBTSEEtMjU2DQo+IFtTSEEtMSBhbmQgU0hB LTI1Ni82NCBub3QgYWxsb3dlZF0NCj4gDQo+IEVESE9DIEVDREggY3VydmUNCj4gLS0tLS0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tDQo+IFAtMjU2DQo+IFAtMzg0DQo+IFAtNTIxDQo+IFgyNTUxOQ0K PiBYNDQ4DQo+IFdlaTI1NTE5IChleHBlY3RlZCB0byBiZSByZWdpc3RlcmVkIHNvb24pDQo+IFtF ZDI1NTE5LCBFZDQ0OCwgc2VjcDI1NmsxIGFyZSBub3QgYWxsb3dlZF0gDQo+IA0KPiBFREhPQyBz aWduYXR1cmUgYWxnb3JpdGhtDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiBFUzI1 Ng0KPiBFUzUxMg0KPiBFUzM4NA0KPiBFZERTQQ0KPiBFUzI1NksNCj4gDQo+IEVESE9DIHNpZ25h dHVyZSBhbGdvcml0aG0gY3VydmUNCj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+IFAt MjU2IChFQ0RTQSBvbmx5KQ0KPiBQLTM4NCAoRUNEU0Egb25seSkNCj4gUC01MjEgKEVDRFNBIG9u bHkpDQo+IEVkMjU1MTkgKEVkRFNBIG9ubHkpDQo+IEVkNDQ4IChFZERTQSBvbmx5KQ0KPiBzZWNw MjU2azEgKEVDRFNBIG9ubHkpDQo+IFtYMjU1MTksIFg0NDggYXJlIG5vdCBhbGxvd2VkXSANCj4g DQo+IChOb24tRUNDIHNpZ25hdHVyZXMgYWxnb3JpdGhtcyBhcmUgc3VwcG9zZWQgdG8gYmUgYWxs b3dlZCBhcyB3ZWxsLiBJIHRoaW5rIHRoZSBkcmFmdCBuZWVkcyB0byBiZSB1cGRhdGVkLikNCj4g DQo+IEJlbG93IGFyZSB0d28gaW5pdGlhbCB3YXlzIHRvIGV4cHJlc3MgdGhlIHNlY3VyaXR5IGxl dmVsLCBvbmUgYXMgYSBmdW5jdGlvbiBvZiB0aGUgTWVodG9kIGFuZCBhbGdvcml0aG1zLiBUaGUg c2Vjb25kIGFzIGEgY29tcGFyaXNpb24gd2l0aCBUTFMgMS4zLiBJbiBnZW5lcmFsLCBFREhPQyB3 aXRoIHRoZSB3ZWFrZXN0IG9wdGlvbnMgU0hBTEwgb2ZmZXIgNjQtYml0IHNlY3VyaXR5IGFnYWlu c3Qgb24tbGluZSBhdHRhY2tzIGFuZCAxMjgtYml0IHNlY3VyaXR5IGFnYWluc3Qgb2ZmLWxpbmUg YXR0YWNrcy4gSSB0aGluayB0aGlzIGFsaWducyB3aXRoIFRMUyAxLjMuDQo+IA0KPiBMZXQgbWUg a25vdyBpZiB0aGlzIGlzIGVub3VnaCBmb3IgdGhlIGZvcm1hbCB2ZXJpZmljYXRpb24sIGlmIHlv dSBuZWVkIHNvbWV0aGluZyBkaWZmZXJlbnQsIG9yIGlmIHNvbWV0aGluZyBpcyBtaXNzaW5nLiBJ dCB3b3VsZCBiZSBnb29kIGlmIHNvbWVib2R5IHJldmlld3MgdGhlIGluZm9ybWF0aW9uIGlzIHRo aXMgbWFpbC4NCj4gDQo+IA0KPiBFREhPQyBzZWN1cml0eSBsZXZlbHMgZm9yIGRpZmZlcmVudCBh c3BlY3RzDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiANCj4gVGhlIHNlY3VyaXR5 IGxldmVsIG9mIGNvbmZpZGVuY2lhbGl0eSBwcm90ZWN0aW9uIGFnYWluc3QgcGFzc2l2ZSBhdHRh Y2tlcnMgc2hvdWxkIGJlIHRoZSBrZXkgbGVuZ3RoIG9mIHRoZSBBRUFEICgxMjgsIDE5Miwgb3Ig MjU2IGJpdHMpLg0KPiANCj4gVGhlIHNlY3VyaXR5IGxlYmVsIG9mIGludGVncml0eSBwcm90ZWN0 aW9uIGFuZCBjb25maWRlbnRpYWxpdHkgYWdhaW5zdCBhY3RpdmUgYXR0YWNrZXJzIHNob3VsZCBi ZSB0aGUgdGFnIGxlbmd0aCBvZiB0aGUgQUVBRCAoNjQgb3IgMTI4IGJpdHMpDQo+IA0KPiBUaGUg YXV0aGVudGljYXRpb24gc2VjdXJpdHkgaW4gdGhlIHN0YXRpYyBESCBtb2RlcyBhcmUgZGV0ZXJt aW5lZCBieSB0aGUgIHRhZyBsZW5ndGggb2YgdGhlIEFFQUQgKDY0IG9yIDEyOCBiaXRzKQ0KPiAN Cj4gVGhlIGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGluIHRoZSBTaWduYXR1cmUgS2V5IG1vZGVz IGFyZSBkZXRlcm1pbmVkIGJ5IHRoZSBzZWN1cml0eSBsZXZlbCBvZiB0aGUgc2lnbmF0dXJlIGFs Z29yaXRobSAoMTI4LCAxOTIsIG9yIDI1NiBiaXQpDQo+IA0KPiBUaGUgaW50ZWdyaXR5IHByb3Rl Y3Rpb24gb2Ygc29tZSBmaWVsZHMgYXJlIGRldGVtaW5lZCBieSB0aGUgc2VjdXJpdHkgbGV2ZWwg b2YgdGhlIHNpZ25hdHVyZSBhbGdvcml0aG0gKDEyOCwgMTkyLCBvciAyNTYgYml0KS4NCj4gDQo+ IA0KPiANCj4gRURIT0Mgc2VjdXJpdHkgbGV2ZWxzIGNvbXBhcmVkIHdpdGggVExTIDEuMw0KPiAt LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gDQo+IE1ldGhvZCAwICgyKiBTaWduYXR1cmUg S2V5ICkgc2hvdWxkIG9mZmVyIHRoZSBzYW1lIHNlY3VyaXR5IGxldmVsIGFzIFRMUyAxLjMgd2l0 aCB0aGUgc2FtZSBhbGdvcml0aG1zLg0KPiANCj4gMC4gKEFFUy1DQ00tMTYtNjQtMTI4LCBTSEEt MjU2LCBYMjU1MTksIEVkRFNBLCBFZDI1NTE5KQ0KPiAxLiAoQUVTLUNDTS0xNi0xMjgtMTI4LCBT SEEtMjU2LCBYMjU1MTksIEVkRFNBLCBFZDI1NTE5KQ0KPiA0LiAoQTEyOEdDTSwgU0hBLTI1Niwg WDI1NTE5LCBFUzI1NiwgUC0yNTYpDQo+IDUgIChBMjU2R0NNLCBTSEEtMzg0LCBQLTM4NCwgRVMz ODQsIFAtMzg0KQ0KPiANCj4gDQo+IE1ldGhvZCAwICgyKiBTdGF0aWMgREggS2V5ICkgaXMgYSBi aXQgdHJpY2tpZXIuDQo+IA0KPiAwLiAoQUVTLUNDTS0xNi02NC0xMjgsIFNIQS0yNTYsIFgyNTUx OSwgRWREU0EsIA0KPiANCj4gVGhlIGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGxldmVsIGhlcmUg aXMgYm91bmRlZCBieSB0aGUgMTI4LWJpdCB0YWcuIFNob3VsZCBvZmZlciBhdCBsZWFzdCB0aGUg c2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMgMS4zIHdpdGggUFNLIGF1dGhlbnRpY2F0aW9uIHdp dGggQ0NNXzgsIGFuZCB0aGUgb3RoZXIgYWxnb3JpdGhtcyB0aGUgc2FtZS4NCj4gDQo+IDEuIChB RVMtQ0NNLTE2LTEyOC0xMjgsIFNIQS0yNTYsIFgyNTUxOSwgRWREU0EsIEVkMjU1MTkpDQo+IDQu IChBMTI4R0NNLCBTSEEtMjU2LCBYMjU1MTksIEVTMjU2LCBQLTI1NikNCj4gDQo+IFNob3VsZCBi b3RoIG9mZmVyIHNpbWlsYXIgc2VjdXJpdHkgbGV2ZWwgYXMgVExTIDEuMyB3aXRoIGNlcnRpZmlj YXRlIGF1dGhlbnRpY2F0aW9uIGFuZCB0aGUgdGhlIG90aGVyIGFsZ29yaXRobXMgdGhlIHNhbWUu DQo+IA0KPiA1CShBMjU2R0NNLCBTSEEtMzg0LCBQLTM4NCwgRVMzODQsIFAtMzg0KQ0KPiANCj4g VGhlIGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGxldmVsIGhlcmUgaXMgYm91bmRlZCBieSB0aGUg MTI4LWJpdCB0YWcuDQo+IA0KPiBDaGVlcnMsDQo+IEpvaG4NCj4gDQo+IA0KPiAtLSANCj4gTGFr ZSBtYWlsaW5nIGxpc3QNCj4gTGFrZUBpZXRmLm9yZw0KPiBodHRwczovL3d3dy5pZXRmLm9yZy9t YWlsbWFuL2xpc3RpbmZvL2xha2UNCg0KDQo= From nobody Fri Feb 12 09:11:08 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC6CE3A17D3 for ; Fri, 12 Feb 2021 09:11:06 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.351 X-Spam-Level: X-Spam-Status: No, score=-2.351 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZCzZkIUNg8-C for ; Fri, 12 Feb 2021 09:11:04 -0800 (PST) Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80057.outbound.protection.outlook.com [40.107.8.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2347D3A1736 for ; Fri, 12 Feb 2021 09:11:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZI80PefjPHkgQQHEzDtCwztO86MrWcZsi8ERof5smAHcGt7Q15luLxdWdv2mERrJ+xFytLT1ijT7jitnItYc8obcrrcF8ySd4HPQLowjqhXhX9pcjc7fYP6yROIwQDm3DZ7K3eLJTbuStrkTBS8vY583oMoXUg4oBHDHM7SuM34CMc8xrBDZ4Qt8KbXSDR1cRArFeOwG3w/aOcg3mgtMXsRbO5/EuxrqabiPomRgR4KH0onmVIwLMTLohAgDcvNHfaV5a/WlXCHW7NTUDVHHKDwiWOljzJTkSv8ejHO7VfonU1wJi1TyEO16YC9cB2B5VZfZ8K66AH4yRlozuGmx4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RCiGRmT5NpYXo30W0Zn/mh3/3KuntdArZEgz/7SElbQ=; b=KvOn1cqz+bUfwEn8BK2KHSZkloxTJKbhKdA13C4hNdGfAENBfZ/Tu8lhnhuq5vz9nLC1cqKlo12Zg66otojWfQ7QsGVx9ulS3lROtySnL0/4w1Nu0ksHkjnFroBUfuLon4nvbBJHBf6eSr26EJKqphv7A1bgBh9PgYSLqeuocJDjqHJE6tS1ekOWDIn9YqEU5nKQwf8guvQp8uhvR76BN3zHFdh159ux55y+OgfbmkjMgDmWnXZ11DrcHJ6xoLq0bq8Yrm7TUP4JFrra5YwhA27UMeGRtkYnyw43858RutrVHwVf9+hB9oJUUS8boiwMXVsES1qnIcvyLBsZww/WKg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RCiGRmT5NpYXo30W0Zn/mh3/3KuntdArZEgz/7SElbQ=; b=NQEBcW6mWBEHz2O0UH/tUyQasSa3vLq+Ue5LhincMWNRChBghUT+odWnFUUPLjGmrAUV+LzYX9HONGSwSkrQKeCYDdMuZhEK8oTAh6Uw7cDDbuUMxSZndCx7TooxeDS1SODxGc5lmJs/BNjLDxIsICQDNl8oHYYC3K97RVSpe8o= Received: from HE1PR0701MB3050.eurprd07.prod.outlook.com (2603:10a6:3:4b::8) by HE1PR0701MB2620.eurprd07.prod.outlook.com (2603:10a6:3:97::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3868.12; Fri, 12 Feb 2021 17:11:01 +0000 Received: from HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::c555:6e47:970c:1268]) by HE1PR0701MB3050.eurprd07.prod.outlook.com ([fe80::c555:6e47:970c:1268%11]) with mapi id 15.20.3868.015; Fri, 12 Feb 2021 17:11:01 +0000 From: John Mattsson To: Karthik Bhargavan CC: "lake@ietf.org" Thread-Topic: [Lake] Security levels for EDHOC for formal verification Thread-Index: AQHXAE3CIo84kXTI0k20kQP+0TZxfqpTKFWAgAB9RoCAAS6fAA== Date: Fri, 12 Feb 2021 17:11:00 +0000 Message-ID: References: <87582CFB-7166-49DB-85F1-E6D389A966F0@ericsson.com> In-Reply-To: Accept-Language: en-US Content-Language: en-GB X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.45.21011103 authentication-results: inria.fr; dkim=none (message not signed) header.d=none;inria.fr; dmarc=none action=none header.from=ericsson.com; x-originating-ip: [81.225.97.222] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 631c38da-6bff-4842-6906-08d8cf792c1c x-ms-traffictypediagnostic: HE1PR0701MB2620: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0701MB3050.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(376002)(136003)(346002)(39860400002)(366004)(396003)(36756003)(4326008)(83380400001)(6512007)(76116006)(66446008)(44832011)(2906002)(33656002)(71200400001)(6506007)(53546011)(5660300002)(2616005)(6916009)(66946007)(66476007)(316002)(966005)(86362001)(15650500001)(30864003)(8936002)(66574015)(26005)(186003)(66556008)(6486002)(64756008)(478600001)(8676002)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata: =?utf-8?B?YTFWU3RoTnphTkxreEI2U1lwcFdmUWZCemdlWnBLdktZYzVKM0M4elA5ayt6?= =?utf-8?B?TU5aSjJiZkhKdHdqaldkZkNWUEQxck1RejlxZWVEZHNCMWxDc1NsTTdvVGlQ?= =?utf-8?B?OFd3NEFYRE1Dc0Jpb1E5QW1iWXRGTHMrVzM4dFRxcmN3eG5ES3lJVERGRDNr?= =?utf-8?B?QlU5VitPQ09VZVhNc3hJcThGSzAwcUxHdXJWOU1nU3FiOGJNZStUTTZlOG1Z?= =?utf-8?B?clUvSjJYZ3M2Rjd1aERkbDIzL2lVb09zdC9pZW5yc2JnU2VvaGxvZE1UdVlV?= =?utf-8?B?emo3RWNZWm5zSTArKzRhaFh4aVhnQTl5d1ZIR2JES00wTENOcVVCNUlySnpP?= =?utf-8?B?K2xDWUVDdit6STZ0aXBQRWRhZ1M4aWJ5WWJvSGJqb3ZwQUNRWUpIMitJN0ho?= =?utf-8?B?cnErWlpEeGwyTWhPdTUwMWNNV0QrRWNYMTlCcXR5YlRNYXF6TW5ldXJCZ284?= =?utf-8?B?ZWVkbmF6TUZ3YkRNYjYrbk5DeWVEWkcrRTdWQStib2dUbjdCRXFwWTZPWkZp?= =?utf-8?B?UUNWdTRXQ0t6V3ZURWpjM3h1aFRJL0NYZE1NOS83eG5kWDBCeWtlbmZ1K2JY?= =?utf-8?B?K2JmOHViVDY3M3NYY3FVeU9xYVNhWWNtTXNmbUtSL2VMdjVUMHg2cGM4R1ZQ?= =?utf-8?B?VFRjYW5YYnBQNkxZZVdYS3Vtb3NrTWI5Zk5COHhSdkdLZ2hhUVV2dUpwNXk4?= =?utf-8?B?TnNTcnhMYzNOQlhQWHVwYTMvdTVIeGJlMVhjU3AwdG1zSjQ5QzBCM09NbUNT?= =?utf-8?B?d3JOVlhMbmxrTFRIL0FpUGRXOEtrMVhhWGRUSG94UFZidVBXVDJZcDljbUx2?= =?utf-8?B?dnIrQW1CT2VyU0FEMHRhdmliWFArNDdpR1duL21LKzkvWmNnQ1c0TlVuaWRp?= =?utf-8?B?N1NwdjRVdmtMblZpdXhCYjVtdFNtaU40VU5Ga05kWXpJcUNGZ1BiZlVYN0xD?= =?utf-8?B?Wk5pLzlTYUdIMkloZGNSWVFGTUEyNFRqK2MyK3RNVldIWGtZeFNFb1M5T1BF?= =?utf-8?B?SklrV0FXQWtueDQ5VENSNGRJL3BuT0d5UTVSTUJOaGVVdWRSUWZMZG9pOGo3?= =?utf-8?B?c2ZpWm1Kdmtham1LanAydzVRSHVpb2xhdVZTbFFQZWYwbDUvcGdQZlhwQTc4?= =?utf-8?B?Ymlxd1FoVkplNTZtZ2djbkpoU2tYTUMyVTkvdlJWQWpoTDZvNEgrd1NneTFp?= =?utf-8?B?Z05MRjlQZnZTL1RzMXJ2SGdmejZHTEVINysxWXhXN1U1Sk8xUS9EYmFtK3lN?= =?utf-8?B?WVdaUVhjNEUxZ3RCZTFkQ3VXWXlGbjRod0dBQ0VuVDliNmVMOXR4ajRXaVY0?= =?utf-8?B?enlLTUd3Y3lzTldFTW0vZmp3dzBIQjB0cE11K2RSaXFYQlh0ZkF2dDF4Tk1D?= =?utf-8?B?UjFST2wvYUJybnV0LzZ2ZnBvb2g0b1hzNEhFNC9za056ZzU3RWJsQUNHKzBq?= =?utf-8?B?NUlWR0pwM1pIWGdSWlcvQm8xamo3Szc1bVZNMWN0MnBqZElJMzdaV2p3L3VB?= =?utf-8?B?blIzUDJ3TjQxVk1GNWc3cVZvTG4ydGwzOERhMUNrd0g1Q1Z6R3F2NXlqVWhH?= =?utf-8?B?clQvNFJJQ3A5bS9UdDFVUFpvRVRFdHhkV3d3aTNWVnFLa25BdzFYYU1FcGFm?= =?utf-8?B?b0lrcmRZR2NkTFhjM29MUnp1NXpFYU42Rk1JL2NtM1FtVVNneXZobTRRbnpo?= =?utf-8?B?TlN2bVByUjNBMG1IdTgvTHdRRGNEM3lHTjYvQWVOa21YMlBXVTFPdTV4NFAz?= =?utf-8?Q?CYhfnm700noeYYNOBkBYaCnasduTwAUbwixoOqJ?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="utf-8" Content-ID: <8AD3DFF21366E6438A65F966FB9E56A6@eurprd07.prod.outlook.com> Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: ericsson.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: HE1PR0701MB3050.eurprd07.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 631c38da-6bff-4842-6906-08d8cf792c1c X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Feb 2021 17:11:00.9697 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ZLTLA5u0u2tq7MdEqwKbIVh7aZiHUjx/y3iR4Z4cUfrVX+gGOzzf+1iZ/ddS3ky5iubGobSb3RXKwEVn4QXXOgTqkjXH2pO8Q71SajQDnLk= X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2620 Archived-At: Subject: Re: [Lake] Security levels for EDHOC for formal verification X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 12 Feb 2021 17:11:07 -0000 SSBmb3Jnb3QgdGhlIFRMUyBGaW5pc2hlZCBNQUMgaW4gbXkgcXVpY2sgc3VtbWFyeSB5ZXN0ZXJk YXkuIFRMUyAxLjIgaGFkIGEgMTIgYnl0ZSBNQUMgYW5kIFRMUyAxLjMgaGFzIGEgaHVnZSAzMiBi eXRlIE1BQy4gVG9nZXRoZXIgd2l0aCB0aGUgcmVjb3JkIGxheWVyIE1BQyBUTFMgMS4zIGFsd2F5 cyBoYXMgYXQgbGVhc3QgNDAgYnl0ZXMgTUFDLiBUaGlzIGlzIHByb2JhYmx5IG92ZXJraWxsLCBi dXQgRURIT0MgZGVmaW5pdGVseSBiZSBzaWduaWZpY2FudGx5IHdlYWtlciBvbiB0aGlzIGFzcGVj dC4gRXNwZWNpYWxseSB0aGUgc3RhdGljIERIIHdpdGggOCBieXRlIE1BQy4NCg0KR8O2cmFuIGFu ZCBJIHdpbGwgdHJ5IHRvIGNvbGxlY3QgdGhlIHJlcXVlc3RlZCB1c2FnZSBhc3N1bXB0aW9ucyBh bmQgd3JpdGUgdGhlbSBkb3duIHNvbWUgZm9ybSB0aGF0IGNhbiBiZSByZWZlcmVuY2VkLiBBIG5l dyAtMDAgZHJhZnQgb3IgYSB0eHQgZmlsZSBvbiB0aGUgTEFLRSBXRyBnaXRodWIuDQoNCi9Kb2hu DQoNCu+7vy0tLS0tT3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBKb2huIE1hdHRzc29uIDxq b2huLm1hdHRzc29uQGVyaWNzc29uLmNvbT4NCkRhdGU6IEZyaWRheSwgMTIgRmVicnVhcnkgMjAy MSBhdCAwMDowNw0KVG86IEthcnRoaWsgQmhhcmdhdmFuIDxrYXJ0aGlrZXlhbi5iaGFyZ2F2YW5A aW5yaWEuZnI+DQpDYzogImxha2VAaWV0Zi5vcmciIDxsYWtlQGlldGYub3JnPg0KU3ViamVjdDog UmU6IFtMYWtlXSBTZWN1cml0eSBsZXZlbHMgZm9yIEVESE9DIGZvciBmb3JtYWwgdmVyaWZpY2F0 aW9uDQoNClRoYW5rcyBLYXJ0aGlrLA0KDQo+VGhpcyBpcyB1c2VmdWwgaW5mb3JtYXRpb24gYW5k IHByb3ZpZGVzIGEgZ29vZCBiYXNpcyBmb3IgZGlzY3Vzc2lvbi4NCj5JdCBpcyBwYXJ0aWN1bGFy bHkgaW50ZXJlc3RpbmcgdG8gc2VlIHRoZSBwbGFjZXMgd2hlcmUgeW91IHNwZWNpZnkgdGhhdCB0 aGUgRURIT0Mgc2VjdXJpdHkgPmd1YXJhbnRlZSBpcyBleHBlY3RlZCB0byBtZWV0IChvciBleGNl ZWQpIFRMUyAxLjMsDQo+YmVjYXVzZSB0aGVzZSBwcm92aWRlIGNsZWFyIGdvYWxzIHdl4oCZZCBs aWtlIHRvIGZvY3VzIG9uIGR1cmluZyBmb3JtYWwgdmVyaWZpY2F0aW9uLg0KDQpbSm9obl0gVGhh dCBzb3VuZHMgZ29vZC4gSSB0aGluayBUTFMgMS4zIGlzIGEgdmVyeSBnb29kIGJhc2lzIGZvciBm dXJ0aGVyIGRpc2N1c3Npb24uIEJvdGggVExTIDEuMyBhbmQgRURIT0MgYXJlIGJhc2VkIG9uIFNJ R01BLiBJZiB0aGVyZSBpcyBhIGxhcmdlIGRpZmZlcmVuY2UsIHRoYXQgaXMgc29tZXRoaW5nIHRo YXQgdGhlIExBS0UgV0cgc2hvdWxkIGRpc2N1c3MuIEFub3RoZXIgZGVzaWduIGFzcGVjdCB0aGF0 IEkgY2FuIHRoaW5rIG9mIGlzOg0KIC0gVExTIDEuMyB1c2VzIG5vbmNlcyBhbmQgdGhlcmVmb3Jl IG1vcmUgZW50cm9weS4gVExTIDEuMyBzZWN1cml0eSBsZXZlbCBhZ2FpbnN0IGh1Z2UgcHJlLWNv bXB1dGVkIHJhaW5ib3cgdGFibGVzIHdvdWxkIGJlIGhpZ2hlciB0aGFuIEVESE9DLg0KDQpUaGUg U3RhdGljIERIIGF1dGhlbnRpY2F0aW9uIGlzIG9mIGNvdXJzZSBxdWl0ZSBkaWZmZXJlbnQgZnJv bSBUTFMgMS4zLiBJIHRoaW5rIGl0IHNob3VsZCBoYXZlIGVxdWFsIG9mIGdyZWF0ZXIgc2VjdXJp dHkgdGhhbiBUTFMgMS4zIHdpdGggUFNLIGF1dGhlbnRpY2F0aW9uLiBFREhPQyB3aXRoIFN0YXRp YyBESCBhdXRoZW50aWNhdGlvbiBzaG91bGQgYmUgc3Ryb25nZXIgdGhhbiBFREhPQyB3aXRoIHNp Z25hdHVyZSBhdXRoZW50aWNhdGlvbiBpcyBzb21lIGFzcGVjdHMgKHRoZSBrZXkgZGVyaXZhdGlv biBpbmNsdWRlcyB0aHJlZSBzaGFyZWQgc2VjcmV0cyBpbnN0ZWFkIG9mIG9uZSBhbmQgaXQgc2hv dWxkIGJlIHN0cm9uZ2VyIGFnYWluc3Qga2V5IGxlYWthZ2UpLCBidXQgd2Vha2VyIGluIHNvbWUg YXNwZWN0cyBhcyB0aGUgYXV0aGVudGljYXRpb24gc2VjdXJpdHkgaXMgYm91bmRlZCBieSB0aGUg QUVBRCB0YWcgbGVuZ3RoLg0KDQo+QXMgUmVuZSBzYXlzLCB0aGUgcHJvb2YgaXRzZWxmIHJlbGll cyBwcmltYXJpbHkgb24gc3RhbmRhcmQgY3J5cHRvIGFzc3VtcHRpb25zIGFib3V0IHRoZSA+dW5k ZXJseWluZyBjb25zdHJ1Y3Rpb25zLCBidXQgb25lIG9mIHRoZSBpbnRlcmVzdGluZyBhc3BlY3Rz IG9mIExBS0UgYW5kIENPU0UgaXMgdGhhdCB3ZSA+YXJlIHRyeWluZyB0byBtaW5pbWl6ZSBtZXNz YWdlIHNpemVzIChlLmcuIGJ5IHVzaW5nIHNob3J0ZXIgYXV0aGVudGljYXRpb24gdGFncykuDQo+ SXQgaXMgdGhlcmVmb3JlIGltcG9ydGFudCB0byB1bmRlcnN0YW5kIHRoZSBjb25jcmV0ZSBzZWN1 cml0eSBnb2FscyBpbiB0ZXJtcyBvZiB0aGUgPmV4cGVjdGVkIHNlY3VyaXR5IGxldmVsIHNvIHdl IGNhbiBtYWtlIHN1cmUgdGhhdCBvbmUgb2YgdGhlIG1lc3NhZ2Ugc2l6ZSBvcHRpbWl6YXRpb25z ID5pc27igJl0IHVuZXhwZWN0ZWRseSBicmVha2luZyB0aGUgc2VjdXJpdHkgb2YgdGhlIHByb3Rv Y29sLg0KPkNvbnZlcnNlbHksIGtub3duIHRoZSB0YXJnZXQgc2VjdXJpdHkgbGV2ZWwgbWF5IGFs c28gYWxsb3cgdXMgdG8gaWRlbnRpZnkgbmV3IGNyeXB0b2dyYXBoaWMgPm9wdGltaXNhdGlvbnMg dGhhdCBoYXZlIG5vdCBiZWVuIGNvbnNpZGVyZWQgeWV0Lg0KDQpZZXMsIGxvb2tpbmcgZm9yd2Fy ZCB0byB5b3UgcmVzdWx0cy4NCg0KPkluIGFkZGl0aW9uIHRvIHRoZSBzaXplcyBvZiB0aGUgY3J5 cHRvIGtleXMsIGl0IHdvdWxkIGFsc28gYmUgdXNlZnVsIHRvIGtub3cgaG93IG1hbnkgRURIT0Mg PnNlc3Npb24gaXMgYW4gaW50aXRpYXRvci9yZXNwb25kZXIgZXhwZWN0ZWQgdG8gcGFydGljaXBh dGUgaW4gKHBlciBkYXksIGFuZCBvdmVyIGl0cyA+bGlmZXRpbWUuKQ0KPkhvdyBtdWNoIGRhdGEg ZG8gd2UgZXhwZWN0IHRvIHNlbmQgaW4gZWFjaCBzZXNzaW9uPw0KPldoYXQgaXMgYSByZWFzb25h YmxlIGNvbXByb21pc2Ugd2luZG93IGZvciBlYWNoIGRldmljZTsgZS5nLiB3b3VsZCBpdCBiZSBv ayB0byByZWZyZXNoIHRoZSA+RUNESCBrZXlzIGV2ZXJ5IGhvdXIsIG9yIG9uY2UgZXZlcnkgZGF5 Pw0KDQpbSm9obl0gSSBob3BlIHRoYXQgb3RoZXIgcGVvcGxlIGluIHRoZSBXRyBjYW4gaGVscCBt ZSBmaWxsIGluIHRoZXNlIGFzc3VtcHRpb25zOg0KDQotIEkgdGhpbmsgYSB0eXBpY2FsIGRldmlj ZSB3b3VsZCBydW4gRURIT0MgcXVpdGUgc2VsZG9tLiBJbiB0aGUgZXh0cmVtZSwgYSBzZW5zb3Ig b3IgYWN0dWF0b3IgbWlnaHQgcnVuIGl0IG9ubHkgb25jZSBkdXJpbmcgaXRzIDEwIHllYXIgbGlm ZXRpbWUsIGJ1dCBtYXliZSBhIG1vcmUgcmVhc29uYWJsZSBlc3RpbWF0ZSBpcyBldmVyeSBtb250 aC95ZWFyIHdoZW4gaXQgcmVjZWl2ZXMgYSBmaXJtd2FyZSB1cGRhdGU/IEEgY2xvdWQgc2VydmVy IG1pZ2h0IHJ1biBFREhPQyB2ZXJ5IHZlcnkgb2Z0ZW4gKG1hbnkgdGltZXMgcGVyIHNlY29uZCkg d2l0aCBkaWZmZXJuZXQgZGV2aWNlcy4NCg0KLSBJIHRoaW5rIG90aGVyIHBlb3BsZSBpbiB0aGUg Z3JvdXAgaGF2ZSBtdWNoIGJldHRlciBhbnN3ZXJzIGZvciBob3cgbXVjaCBkYXRhIGFuIGF2ZXJh Z2UgSW9UIGRldmljZSBzZW5kcyBwZXIgdGltZSB1bml0Lg0KICBBbHNvIHdoYXQgZG8geW91IG1l YW4gYnkgc2Vzc2lvbj8gQ3VycmVudCB3b3JrIGluIHByb2dyZXNzIGlzIHRoYXQgT1NDT1JFIHdp bGwgcmVrZXkgZnJlcXVlbnRseSB0byBnZXQgRlMgd2l0aG91dCByZXJ1bm5pZ24gdGhlIGZ1bGwg RURIT0MuIFRoaXMgd291bGQgYmUgc2ltaWxhciB0byBUTFMgMS4zIEtleVVwZGF0ZS4gQXMgdGhl IGRldGFpbHMgYXJlIG5vdCBjb21wbGV0ZWx5IHNwZWNpZmllZCB5ZXQsIEkgZG8gbm90IGtub3cg aWYgeW91IGNhbiBtb2RlbCB0aGlzIGJ1dCBhbnkgY29tbWVudHMgb3Igc3VnZ2VzdGlvbiB3b3Vs ZCBiZSB2ZXJ5IHdlbGNvbWUuDQoNCi0gV2hpY2ggRUNESCBrZXlzIGRvIHlvdSBtZWFuPyBFREhP QyBjdXJyZW50bHkgc3RhdGVzIHRoYXQgdGhlIGVwaGVtZXJhbCBrZXlzIE1VU1QgTk9UIGJlIHJl dXNlZCBzbyB0aGV5IGFyZSBlcmFzZWQgZnJvbSBtZW1vcnkgYWZ0ZXIgZWFjaCBydW4uIFRoZSBT dGF0aWMgRUNESCBrZXlzIHVzZWQgZm9yIEVTIEVDREggYXV0aGVudGljYXRpb24gd291bGQgdHlw aWNhbGx5IGJlIG11Y2ggbW9yZSBsb25nIGxpdmVkLiBJdCBpcyBjb21tb24gdG8gdXNlIElvVCBh dXRoZW50aWNhdGlvbiBrZXlzIGZvciB0aGUgbGlmZXRpbWUgb2YgYSBkZXZpY2UsIGkuZS4sIGFy b3VuZCAxMCB5ZWFycywgYnV0IHJlY2VudGx5IHRoZXJlIGhhcyBiZWVuIGEgdHJlbmQgaW4gdGhl IEhUVFBTIHdvcmxkIHRvIHVzZSBzaG9ydGVyIGxpZmV0aW1lcyAoMSB5ZWFyIGluc3RlYWQgb2Yg MyB5ZWFycykuDQoNCj5JdCB3b3VsZCBiZSBncmVhdCB0byBjb2xsZWN0IGEgY29tcGVuZGl1bSBv ZiBib3RoIHVzYWdlIGNvbnN0cmFpbnRzIGxpa2UgdGhlc2UgPmFuZCBjb25jcmV0ZSBzZWN1cml0 eSB0YXJnZXRzIHNvIHdlIGNhbiBtYWtlIHN1cmUgdGhlIHByb3RvY29sIChhbmQgaXRzID5yZWNv bW1lbmRlZCBjaXBoZXJzdWl0ZSkgc2F0aXNmaWVzIHRoZW0uDQoNCltKb2huXSBJIGd1ZXNzIHdl IGNhbiB0dXJuIHRoaXMgZGlzY3Vzc2lvbiBpbnRvIGEgYXBwZW5kaXggb3Igc29tZSBvdGhlciBm b3JtIG9mIGRvY3VtZW50IHRoYXQgeW91IGNhbiByZWZlcmVuY2UuDQoNCkNoZWVycywNCkpvaG4N Cg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IEthcnRoaWsgQmhhcmdhdmFuIDxr YXJ0aGlrZXlhbi5iaGFyZ2F2YW5AaW5yaWEuZnI+DQpEYXRlOiBUaHVyc2RheSwgMTEgRmVicnVh cnkgMjAyMSBhdCAxNzo0MA0KVG86IEpvaG4gTWF0dHNzb24gPGpvaG4ubWF0dHNzb25AZXJpY3Nz b24uY29tPg0KQ2M6ICJsYWtlQGlldGYub3JnIiA8bGFrZUBpZXRmLm9yZz4NClN1YmplY3Q6IFJl OiBbTGFrZV0gU2VjdXJpdHkgbGV2ZWxzIGZvciBFREhPQyBmb3IgZm9ybWFsIHZlcmlmaWNhdGlv bg0KDQpUaGFua3MgSm9obiwNCg0KVGhpcyBpcyB1c2VmdWwgaW5mb3JtYXRpb24gYW5kIHByb3Zp ZGVzIGEgZ29vZCBiYXNpcyBmb3IgZGlzY3Vzc2lvbi4NCkl0IGlzIHBhcnRpY3VsYXJseSBpbnRl cmVzdGluZyB0byBzZWUgdGhlIHBsYWNlcyB3aGVyZSB5b3Ugc3BlY2lmeSB0aGF0IHRoZSBFREhP QyBzZWN1cml0eSBndWFyYW50ZWUgaXMgZXhwZWN0ZWQgdG8gbWVldCAob3IgZXhjZWVkKSBUTFMg MS4zLA0KYmVjYXVzZSB0aGVzZSBwcm92aWRlIGNsZWFyIGdvYWxzIHdl4oCZZCBsaWtlIHRvIGZv Y3VzIG9uIGR1cmluZyBmb3JtYWwgdmVyaWZpY2F0aW9uLg0KDQpBcyBSZW5lIHNheXMsIHRoZSBw cm9vZiBpdHNlbGYgcmVsaWVzIHByaW1hcmlseSBvbiBzdGFuZGFyZCBjcnlwdG8gYXNzdW1wdGlv bnMgYWJvdXQgdGhlIHVuZGVybHlpbmcgY29uc3RydWN0aW9ucywgYnV0IG9uZSBvZiB0aGUgaW50 ZXJlc3RpbmcgYXNwZWN0cyBvZiBMQUtFIGFuZCBDT1NFIGlzIHRoYXQgd2UgYXJlIHRyeWluZyB0 byBtaW5pbWl6ZSBtZXNzYWdlIHNpemVzIChlLmcuIGJ5IHVzaW5nIHNob3J0ZXIgYXV0aGVudGlj YXRpb24gdGFncykuDQpJdCBpcyB0aGVyZWZvcmUgaW1wb3J0YW50IHRvIHVuZGVyc3RhbmQgdGhl IGNvbmNyZXRlIHNlY3VyaXR5IGdvYWxzIGluIHRlcm1zIG9mIHRoZSBleHBlY3RlZCBzZWN1cml0 eSBsZXZlbCBzbyB3ZSBjYW4gbWFrZSBzdXJlIHRoYXQgb25lIG9mIHRoZSBtZXNzYWdlIHNpemUg b3B0aW1pemF0aW9ucyBpc27igJl0IHVuZXhwZWN0ZWRseSBicmVha2luZyB0aGUgc2VjdXJpdHkg b2YgdGhlIHByb3RvY29sLg0KQ29udmVyc2VseSwga25vd24gdGhlIHRhcmdldCBzZWN1cml0eSBs ZXZlbCBtYXkgYWxzbyBhbGxvdyB1cyB0byBpZGVudGlmeSBuZXcgY3J5cHRvZ3JhcGhpYyBvcHRp bWlzYXRpb25zIHRoYXQgaGF2ZSBub3QgYmVlbiBjb25zaWRlcmVkIHlldC4NCg0KSW4gYWRkaXRp b24gdG8gdGhlIHNpemVzIG9mIHRoZSBjcnlwdG8ga2V5cywgaXQgd291bGQgYWxzbyBiZSB1c2Vm dWwgdG8ga25vdyBob3cgbWFueSBFREhPQyBzZXNzaW9uIGlzIGFuIGludGl0aWF0b3IvcmVzcG9u ZGVyIGV4cGVjdGVkIHRvIHBhcnRpY2lwYXRlIGluIChwZXIgZGF5LCBhbmQgb3ZlciBpdHMgbGlm ZXRpbWUuKQ0KSG93IG11Y2ggZGF0YSBkbyB3ZSBleHBlY3QgdG8gc2VuZCBpbiBlYWNoIHNlc3Np b24/DQpXaGF0IGlzIGEgcmVhc29uYWJsZSBjb21wcm9taXNlIHdpbmRvdyBmb3IgZWFjaCBkZXZp Y2U7IGUuZy4gd291bGQgaXQgYmUgb2sgdG8gcmVmcmVzaCB0aGUgRUNESCBrZXlzIGV2ZXJ5IGhv dXIsIG9yIG9uY2UgZXZlcnkgZGF5Pw0KDQpJdCB3b3VsZCBiZSBncmVhdCB0byBjb2xsZWN0IGEg Y29tcGVuZGl1bSBvZiBib3RoIHVzYWdlIGNvbnN0cmFpbnRzIGxpa2UgdGhlc2UgYW5kIGNvbmNy ZXRlIHNlY3VyaXR5IHRhcmdldHMgc28gd2UgY2FuIG1ha2Ugc3VyZSB0aGUgcHJvdG9jb2wgKGFu ZCBpdHMgcmVjb21tZW5kZWQgY2lwaGVyc3VpdGUpIHNhdGlzZmllcyB0aGVtLg0KDQpCZXN0LA0K LUthcnRoaWsNCg0KDQo+IE9uIDExIEZlYiAyMDIxLCBhdCAwOToxMywgSm9obiBNYXR0c3NvbiA8 am9obi5tYXR0c3Nvbj00MGVyaWNzc29uLmNvbUBkbWFyYy5pZXRmLm9yZz4gd3JvdGU6DQo+IA0K PiBIaSwNCj4gDQo+IFRoZXJlIHdhcyBhIHJlcXVlc3QgZnJvbSBLYXJ0aGlrIHRvIGhhdmUgc3Bl Y2lmaWVkIHNlY3VyaXR5IGxldmVscyBmb3IgRURIT0Mgc28gdGhhdCBmb3JtYWwgdmVyaWZpY2F0 aW9uIGNhbiB2ZXJpZnkgb3IgZmFsc2lmeSB0aGUgY2xhaW1zLiBUaGlzIGlzIG5vdCB0cml2aWFs LiBCZWxvdyBpcyBhIGZpcnN0IHRyeS4gTGV0J3MgZGlzY3VzcyBpZiB0aGlzIGlzIGVub3VnaCBv ciBpZiBtb3JlIG9yIGRpZmZlcmVudCBpbmZvcm1hdGlvbiBpcyBuZWVkZWQuDQo+IA0KPiBUaGUg ZGVzaWduIG9iamVjdGl2ZXMgb2YgRURIT0MgaGFzIGJlZW4gdG8gaGF2ZSBhcHByb3hpbWF0bHkg dGhlIHNhbWUgc2VjdXJpdHkgbGV2ZWwgYXMgVExTIHdoZW4gdGhlIHNhbWUgYWxnb3JpdGhtcyBh cmUgdXNlZCwgYnV0IHRvIGhhdmUgbXVjaCBzbWFsbGVyIG1lc3NhZ2VzLiBKdXN0IGxpa2UgVExT IEkgdGhpbmsgdGhlIGV4cGVjdGVkIHNlY3VyaXR5IGxldmVsIGRlcGVuZHMgaGVhdmlseSBvbiB0 aGUgY2hvc2VuIGFsZ29yaXRobXMgYW5kIHRoZSBtZXRob2QuIE1ldGhvZCAzIHNob3VsZCBiZSBj b21wYXJhYmxlIHdpdGggVExTIDEuMyB3aXRoIG11dHVhbCBjZXJ0aWZpY2F0ZSBiYXNlZCBhdXRo ZW50aWNhdGlvbi4gTWV0aGVkIDAgaXMgYSBiaXQgdHJpY2tpZXIgdG8gY29tcGFyZSB0byBUTFMu DQo+IA0KPiBJbiBnZW5lcmFsIHRoZXJlIHNob3VsZCBub3QgYmUgbXVjaCBkaWZmZXJlbmNlIGJl dHdlZW4gRURIT0MgYW5kIFRMUyAxLjMgd2hlbiBjZXJ0aWZpY2F0ZSBiYXNlZCBhdXRoZW50aWNh dGlvbiBpcyB1c2VkLiBUaGUgZXhwb3J0ZWQga2V5cyBzaG91bGQgYmUgYSBiaXQgc3Ryb25nZXIg YXMgRURIT0MgaW5jbHVkZSBtZXNzYWdlXzIgYW5kIHRoZSBmb3IgU3RhdGljIERIIGFsc28gdGhl IHByaXZhdGUgYXV0aGVudGljYXRpb24ga2V5cy4gVGhlIFN0YXRpYyBESCBNZXRob2Qgd2l0aCA2 NCBiaXQgdGFncyBkb2VzIG5vdCBvZmZlciB0aGUgc2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMg MS4zIHdpdGggY2VydGlmaWNhdGUtYmFzZWQgYXV0aGVudGljYXRpb24sIGJ1dCBzaG91bGQgb2Zm ZXIgYmV0dGVyIHNlY3VyaXR5IHRoYW4gVExTIDEuMyB3aXRoIFBTSyBhdXRoZW50aWNhdGlvbiBh bmQgc2hvcnQgdGFncy4NCj4gDQo+IEVESE9DIGNhbiB1c2UgYWxsIGFsZ29yaXRobXMgZGVmaW5l ZCBmb3IgQ09TRSAoYnV0IG1heWJlIHlvdSB3aWxsIHJlc3RyaWN0IHlvdXIgd29yayB0bw0KPiB0 aGUgcHJlLWRlZmluZWQgY2lwaGVyIHN1aXRlcykuIEJlbG93IGFyZSB0aGUgcmVsZXZhbnQgYWxn b3JpdGhtcyBkZWZpbmVkIGZvciBDT1NFLg0KPiANCj4gRURIT0MgQUVBRCBhbGdvcml0aG06DQo+ IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiBBRVMtQ0NNLTE2LTY0LTEyOA0KPiBBRVMt Q0NNLTE2LTY0LTI1Ng0KPiBBRVMtQ0NNLTY0LTY0LTEyOA0KPiBBRVMtQ0NNLTY0LTY0LTI1Ng0K PiBBRVMtQ0NNLTE2LTEyOC0xMjgNCj4gQUVTLUNDTS0xNi0xMjgtMjU2DQo+IEFFUy1DQ00tNjQt MTI4LTEyOA0KPiBBRVMtQ0NNLTY0LTEyOC0yNTYNCj4gQTEyOEdDTQ0KPiBBMTkyR0NNDQo+IEEy NTZHQ00NCj4gQ2hhQ2hhMjAvUG9seTEzMDUNCj4gDQo+IEVESE9DIGhhc2ggYWxnb3JpdGhtDQo+ IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiBTSEFLRTI1Ng0KPiBTSEEtNTEyDQo+IFNI QS0zODQNCj4gU0hBS0UxMjgNCj4gU0hBLTUxMi8yNTYNCj4gU0hBLTI1Ng0KPiBbU0hBLTEgYW5k IFNIQS0yNTYvNjQgbm90IGFsbG93ZWRdDQo+IA0KPiBFREhPQyBFQ0RIIGN1cnZlDQo+IC0tLS0t LS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0KPiBQLTI1Ng0KPiBQLTM4NA0KPiBQLTUyMQ0KPiBYMjU1 MTkNCj4gWDQ0OA0KPiBXZWkyNTUxOSAoZXhwZWN0ZWQgdG8gYmUgcmVnaXN0ZXJlZCBzb29uKQ0K PiBbRWQyNTUxOSwgRWQ0NDgsIHNlY3AyNTZrMSBhcmUgbm90IGFsbG93ZWRdIA0KPiANCj4gRURI T0Mgc2lnbmF0dXJlIGFsZ29yaXRobQ0KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4g RVMyNTYNCj4gRVM1MTINCj4gRVMzODQNCj4gRWREU0ENCj4gRVMyNTZLDQo+IA0KPiBFREhPQyBz aWduYXR1cmUgYWxnb3JpdGhtIGN1cnZlDQo+IC0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLQ0K PiBQLTI1NiAoRUNEU0Egb25seSkNCj4gUC0zODQgKEVDRFNBIG9ubHkpDQo+IFAtNTIxIChFQ0RT QSBvbmx5KQ0KPiBFZDI1NTE5IChFZERTQSBvbmx5KQ0KPiBFZDQ0OCAoRWREU0Egb25seSkNCj4g c2VjcDI1NmsxIChFQ0RTQSBvbmx5KQ0KPiBbWDI1NTE5LCBYNDQ4IGFyZSBub3QgYWxsb3dlZF0g DQo+IA0KPiAoTm9uLUVDQyBzaWduYXR1cmVzIGFsZ29yaXRobXMgYXJlIHN1cHBvc2VkIHRvIGJl IGFsbG93ZWQgYXMgd2VsbC4gSSB0aGluayB0aGUgZHJhZnQgbmVlZHMgdG8gYmUgdXBkYXRlZC4p DQo+IA0KPiBCZWxvdyBhcmUgdHdvIGluaXRpYWwgd2F5cyB0byBleHByZXNzIHRoZSBzZWN1cml0 eSBsZXZlbCwgb25lIGFzIGEgZnVuY3Rpb24gb2YgdGhlIE1laHRvZCBhbmQgYWxnb3JpdGhtcy4g VGhlIHNlY29uZCBhcyBhIGNvbXBhcmlzaW9uIHdpdGggVExTIDEuMy4gSW4gZ2VuZXJhbCwgRURI T0Mgd2l0aCB0aGUgd2Vha2VzdCBvcHRpb25zIFNIQUxMIG9mZmVyIDY0LWJpdCBzZWN1cml0eSBh Z2FpbnN0IG9uLWxpbmUgYXR0YWNrcyBhbmQgMTI4LWJpdCBzZWN1cml0eSBhZ2FpbnN0IG9mZi1s aW5lIGF0dGFja3MuIEkgdGhpbmsgdGhpcyBhbGlnbnMgd2l0aCBUTFMgMS4zLg0KPiANCj4gTGV0 IG1lIGtub3cgaWYgdGhpcyBpcyBlbm91Z2ggZm9yIHRoZSBmb3JtYWwgdmVyaWZpY2F0aW9uLCBp ZiB5b3UgbmVlZCBzb21ldGhpbmcgZGlmZmVyZW50LCBvciBpZiBzb21ldGhpbmcgaXMgbWlzc2lu Zy4gSXQgd291bGQgYmUgZ29vZCBpZiBzb21lYm9keSByZXZpZXdzIHRoZSBpbmZvcm1hdGlvbiBp cyB0aGlzIG1haWwuDQo+IA0KPiANCj4gRURIT0Mgc2VjdXJpdHkgbGV2ZWxzIGZvciBkaWZmZXJl bnQgYXNwZWN0cw0KPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gDQo+IFRoZSBzZWN1 cml0eSBsZXZlbCBvZiBjb25maWRlbmNpYWxpdHkgcHJvdGVjdGlvbiBhZ2FpbnN0IHBhc3NpdmUg YXR0YWNrZXJzIHNob3VsZCBiZSB0aGUga2V5IGxlbmd0aCBvZiB0aGUgQUVBRCAoMTI4LCAxOTIs IG9yIDI1NiBiaXRzKS4NCj4gDQo+IFRoZSBzZWN1cml0eSBsZWJlbCBvZiBpbnRlZ3JpdHkgcHJv dGVjdGlvbiBhbmQgY29uZmlkZW50aWFsaXR5IGFnYWluc3QgYWN0aXZlIGF0dGFja2VycyBzaG91 bGQgYmUgdGhlIHRhZyBsZW5ndGggb2YgdGhlIEFFQUQgKDY0IG9yIDEyOCBiaXRzKQ0KPiANCj4g VGhlIGF1dGhlbnRpY2F0aW9uIHNlY3VyaXR5IGluIHRoZSBzdGF0aWMgREggbW9kZXMgYXJlIGRl dGVybWluZWQgYnkgdGhlICB0YWcgbGVuZ3RoIG9mIHRoZSBBRUFEICg2NCBvciAxMjggYml0cykN Cj4gDQo+IFRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBpbiB0aGUgU2lnbmF0dXJlIEtleSBt b2RlcyBhcmUgZGV0ZXJtaW5lZCBieSB0aGUgc2VjdXJpdHkgbGV2ZWwgb2YgdGhlIHNpZ25hdHVy ZSBhbGdvcml0aG0gKDEyOCwgMTkyLCBvciAyNTYgYml0KQ0KPiANCj4gVGhlIGludGVncml0eSBw cm90ZWN0aW9uIG9mIHNvbWUgZmllbGRzIGFyZSBkZXRlbWluZWQgYnkgdGhlIHNlY3VyaXR5IGxl dmVsIG9mIHRoZSBzaWduYXR1cmUgYWxnb3JpdGhtICgxMjgsIDE5Miwgb3IgMjU2IGJpdCkuDQo+ IA0KPiANCj4gDQo+IEVESE9DIHNlY3VyaXR5IGxldmVscyBjb21wYXJlZCB3aXRoIFRMUyAxLjMN Cj4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+IA0KPiBNZXRob2QgMCAoMiogU2lnbmF0 dXJlIEtleSApIHNob3VsZCBvZmZlciB0aGUgc2FtZSBzZWN1cml0eSBsZXZlbCBhcyBUTFMgMS4z IHdpdGggdGhlIHNhbWUgYWxnb3JpdGhtcy4NCj4gDQo+IDAuIChBRVMtQ0NNLTE2LTY0LTEyOCwg U0hBLTI1NiwgWDI1NTE5LCBFZERTQSwgRWQyNTUxOSkNCj4gMS4gKEFFUy1DQ00tMTYtMTI4LTEy OCwgU0hBLTI1NiwgWDI1NTE5LCBFZERTQSwgRWQyNTUxOSkNCj4gNC4gKEExMjhHQ00sIFNIQS0y NTYsIFgyNTUxOSwgRVMyNTYsIFAtMjU2KQ0KPiA1ICAoQTI1NkdDTSwgU0hBLTM4NCwgUC0zODQs IEVTMzg0LCBQLTM4NCkNCj4gDQo+IA0KPiBNZXRob2QgMCAoMiogU3RhdGljIERIIEtleSApIGlz IGEgYml0IHRyaWNraWVyLg0KPiANCj4gMC4gKEFFUy1DQ00tMTYtNjQtMTI4LCBTSEEtMjU2LCBY MjU1MTksIEVkRFNBLCANCj4gDQo+IFRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBsZXZlbCBo ZXJlIGlzIGJvdW5kZWQgYnkgdGhlIDEyOC1iaXQgdGFnLiBTaG91bGQgb2ZmZXIgYXQgbGVhc3Qg dGhlIHNhbWUgc2VjdXJpdHkgbGV2ZWwgYXMgVExTIDEuMyB3aXRoIFBTSyBhdXRoZW50aWNhdGlv biB3aXRoIENDTV84LCBhbmQgdGhlIG90aGVyIGFsZ29yaXRobXMgdGhlIHNhbWUuDQo+IA0KPiAx LiAoQUVTLUNDTS0xNi0xMjgtMTI4LCBTSEEtMjU2LCBYMjU1MTksIEVkRFNBLCBFZDI1NTE5KQ0K PiA0LiAoQTEyOEdDTSwgU0hBLTI1NiwgWDI1NTE5LCBFUzI1NiwgUC0yNTYpDQo+IA0KPiBTaG91 bGQgYm90aCBvZmZlciBzaW1pbGFyIHNlY3VyaXR5IGxldmVsIGFzIFRMUyAxLjMgd2l0aCBjZXJ0 aWZpY2F0ZSBhdXRoZW50aWNhdGlvbiBhbmQgdGhlIHRoZSBvdGhlciBhbGdvcml0aG1zIHRoZSBz YW1lLg0KPiANCj4gNQkoQTI1NkdDTSwgU0hBLTM4NCwgUC0zODQsIEVTMzg0LCBQLTM4NCkNCj4g DQo+IFRoZSBhdXRoZW50aWNhdGlvbiBzZWN1cml0eSBsZXZlbCBoZXJlIGlzIGJvdW5kZWQgYnkg dGhlIDEyOC1iaXQgdGFnLg0KPiANCj4gQ2hlZXJzLA0KPiBKb2huDQo+IA0KPiANCj4gLS0gDQo+ IExha2UgbWFpbGluZyBsaXN0DQo+IExha2VAaWV0Zi5vcmcNCj4gaHR0cHM6Ly93d3cuaWV0Zi5v cmcvbWFpbG1hbi9saXN0aW5mby9sYWtlDQoNCg0KDQo= From nobody Fri Feb 12 16:36:23 2021 Return-Path: X-Original-To: lake@ietf.org Delivered-To: lake@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 153A03A1173; Fri, 12 Feb 2021 16:33:27 -0800 (PST) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit From: "\"IETF Secretariat\"" To: , Cc: kaduk@mit.edu, lake@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.25.0 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <161317640699.31337.18436770268731655065@ietfa.amsl.com> Date: Fri, 12 Feb 2021 16:33:27 -0800 Archived-At: Subject: [Lake] lake - Requested session has been scheduled for IETF 110 X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Feb 2021 00:33:36 -0000 Dear Mališa Vučinić, The session(s) that you have requested have been scheduled. Below is the scheduled session information followed by the original request. lake Session 1 (2:00 requested) Tuesday, 9 March 2021, Session I 1300-1500 Room Name: Room 8 size: 508 --------------------------------------------- iCalendar: https://datatracker.ietf.org/meeting/110/sessions/lake.ics Request Information: --------------------------------------------------------- Working Group Name: Lightweight Authenticated Key Exchange Area Name: Security Area Session Requester: Mališa Vučinić Number of Sessions: 1 Length of Session(s): 2 Hours Number of Attendees: 50 Conflicts to Avoid: Chair Conflict: homenet Technology Overlap: ace core 6tisch roll lpwan lwig cbor saag quic mls tls Key Participant Conflict: httpbis add People who must be present: Benjamin Kaduk Malisa Vucinic Stephen Farrell Resources Requested: Special Requests: --------------------------------------------------------- From nobody Fri Feb 12 23:43:13 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5316D3A107C; Fri, 12 Feb 2021 23:42:59 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.219 X-Spam-Level: X-Spam-Status: No, score=-4.219 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MBpFkb7wFKFy; Fri, 12 Feb 2021 23:42:57 -0800 (PST) Received: from gabriel-vm-2.zfn.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F1223A1079; Fri, 12 Feb 2021 23:42:57 -0800 (PST) Received: from [192.168.217.152] (p5089a828.dip0.t-ipconnect.de [80.137.168.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-vm-2.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4Dd2Ql4pPTzyVg; Sat, 13 Feb 2021 08:42:55 +0100 (CET) From: Carsten Bormann Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.60.0.2.21\)) Date: Sat, 13 Feb 2021 08:42:55 +0100 Message-Id: <8767C895-6A02-4B00-8507-70FFED47E1D9@tzi.org> To: suit@ietf.org, teep@ietf.org, din@irtf.org, rats@ietf.org, lake@ietf.org X-Mailer: Apple Mail (2.3654.60.0.2.21) Archived-At: Subject: [Lake] Constrained Node/Network Cluster @ IETF110: "FINAL" AGENDA X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Feb 2021 07:43:00 -0000 Here is my usual eclectic condensed agenda based on the "FINAL" AGENDA for IETF110. Remember that further agenda changes can still happen. A number of changes have been made with respect to the draft agenda. CBOR has moved to Monday into what was ASDF's slot, and ASDF is now on top of IOTOPS (ugh). COSE has moved into Friday's middle slot that had been used by CBOR. Other conflicts that remain are LAKE/RATS, CORE/DANISH -- you just can't do both IoT application layer and IoT security this time (ROLL/SUIT and LPWAN/RATS are probably bearable). All times *on my agenda* are in UTC (the default page is UTC+0100). https://datatracker.ietf.org/meeting/agenda-utc might be handy, and the main agenda tool now has an awesome timezone selection tool. Note that both EU and US are still on winter time (standard time) then; the US moves forward on Mar 14 with the EU following Mar 28 -- we'll have two weeks of confusion this time right after the IETF. Gr=C3=BC=C3=9Fe, Carsten MONDAY, March 1, 2021 1600-1800 Hackathon Kickoff Rm 1 GEN hackathon Hackathon THURSDAY, March 4, 2021 1700-1900 Technology Deep Dive Rm 1 tdd Technology Deep Dive FRIDAY, March 5, 2021 1600-1800 Hackathon Closing Rm 1 GEN hackathon Hackathon MONDAY, March 8, 2021 1200-1400 Session I Rm 1 ART dispatch Dispatch WG - Joint with ARTAREA Rm 2 IRTF irtfopen IRTF Open Meeting Rm 6 RTG raw Reliable and Available Wireless WG Rm 8 SEC emu EAP Method Update WG 1430-1530 Session II Rm 1 ART *** cbor Concise Binary Object Representation = Maintenance and Extensions WG Rm 2 IRTF maprg Measurement and Analysis for Protocols Rm 3 RTG detnet Deterministic Networking WG Rm 5 RTG rift Routing In Fat Trees WG Rm 6 SEC mls Messaging Layer Security WG 1600-1800 Session III Rm 2 ART *** core Constrained RESTful Environments WG Rm 3 ART webtrans WebTransport WG Rm 7 SEC tls Transport Layer Security WG Rm 8 TSV tsvwg Transport Area Working Group WG TUESDAY, March 9, 2021 1200-1400 Session I Rm 3 INT 6man IPv6 Maintenance WG Rm 6 RTG bier Bit Indexed Explicit Replication WG Rm 8 SEC *** lake Lightweight Authenticated Key Exchange = WG Rm 9 SEC *** rats Remote ATtestation ProcedureS WG 1430-1530 Session II Rm 1 ART *** asdf A Semantic Definition Format for Data = and Interactions of Things WG Rm 4 INT add Adaptive DNS Discovery WG Rm 5 OPS *** iotops IOT Operations WG Rm 6 RTG babel Babel routing protocol WG Rm 7 RTG detnet Deterministic Networking WG Rm 9 SEC acme Automated Certificate Management = Environment WG 1600-1800 Session III Rm 3 INT *** drip Drone Remote ID Protocol WG Rm 5 OPS v6ops IPv6 Operations WG Rm 8 SEC gnap Grant Negotiation and Authorization = Protocol WG Rm 9 TSV masque Multiplexed Application Substrate over = QUIC Encryption WG WEDNESDAY, March 10, 2021 1200-1400 Session I Rm 2 ART jsonpath JSON Path WG Rm 3 IRTF icnrg Information-Centric Networking Rm 8 SEC *** teep Trusted Execution Environment = Provisioning WG Rm 9 TSV quic QUIC WG 1430-1530 Session II Rm 4 INT *** lpwan IPv6 over Low Power Wide-Area Networks = WG Rm 5 IRTF qirg Quantum Internet Research Group Rm 6 OPS anima Autonomic Networking Integrated Model = and Approach WG Rm 8 SEC *** rats Remote ATtestation ProcedureS WG Rm 9 TSV tsvwg Transport Area Working Group WG THURSDAY, March 11, 2021 1200-1400 Session I Rm 2 INT *** 6lo IPv6 over Networks of = Resource-constrained Nodes WG Rm 3 INT add Adaptive DNS Discovery WG Rm 4 INT dnssd Extensions for Scalable DNS Service = Discovery WG - Joint with HOMENET Rm 4 INT homenet Home Networking WG - Joint with DNSSD Rm 8 SEC saag Security Area Open Meeting Rm 9 TSV tsvarea Transport Area Open Meeting 1430-1530 Session II Rm 3 IRTF panrg Path Aware Networking RG Rm 6 RTG *** roll Routing Over Low power and Lossy = networks WG Rm 7 SEC openpgp Open Specification for Pretty Good = Privacy WG Rm 8 SEC *** suit Software Updates for Internet of Things = WG 1600-1800 Session III Rm 2 INT 6man IPv6 Maintenance WG Rm 4 IRTF*** t2trg Thing-to-Thing Rm 7 RTG rtgarea Routing Area Open Meeting - Joint with = RTGWG Rm 8 SEC secdispatch Security Dispatch WG FRIDAY, March 12, 2021 1200-1400 Session I Rm 1 ART *** core Constrained RESTful Environments WG Rm 3 IRTF cfrg Crypto Forum Rm 7 SEC *** danish DANE AutheNtication for Iot Service = Hardening BOF 1430-1530 Session II Rm 3 ART wpack Web Packaging WG Rm 4 INT intarea Internet Area Working Group WG Rm 6 IRTF pearg Privacy Enhancements and Assessments = Research Group Rm 8 SEC *** cose CBOR Object Signing and Encryption WG 1600-1800 Session III Rm 1 ART httpapi Building Blocks for HTTP APIs WG Rm 2 IRTF coinrg Computing in the Network Research Group Rm 6 SEC *** ace Authentication and Authorization for = Constrained Environments WG Rm 8 SEC privacypass Privacy Pass WG From nobody Sat Feb 13 23:30:24 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C62A3A15DC for ; Sat, 13 Feb 2021 23:30:23 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.198 X-Spam-Level: X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IoRo_n33QLkq for ; Sat, 13 Feb 2021 23:30:21 -0800 (PST) Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6ABF23A15DA for ; Sat, 13 Feb 2021 23:30:21 -0800 (PST) Received: by mail-wr1-x430.google.com with SMTP id t15so4800472wrx.13 for ; Sat, 13 Feb 2021 23:30:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=message-id:date:mime-version:from:to:subject; bh=Zx3cYGwOw4UWscWwAPU8kIE0B+8yJlCFKpPmWCBP8jg=; b=lcgd6Km2tRjkfDqIGOhGQENrvBwPwnkWkHpxl7hPz1SsWtIlcE5LCk4D2Onf/oYXlS hJn1bHvZApfSjndRIxoZ7coP6X1XQttILT9r9AVLXOJqUf2beyh6Elna/iy6IXjFponQ EVHFLp0dtLrbLMc25e8KzK5nG8/lK+s4NZuD+8NHacVYPuROPasv/e9zYXdy1FIhg6Hp i6+TP70nNHWjLBmieO7kEewEjIbctk8ntQmsewmXUZuABsBjEMyql7hpGBj+Au78fc99 3fBQPkkUlU+JPxMD0X9G3I4+4+M0qVND9tAt8jFbM+Q2i+UOkO8pyjz8GxeT3TuRyZbk EzTw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:mime-version:from:to:subject; bh=Zx3cYGwOw4UWscWwAPU8kIE0B+8yJlCFKpPmWCBP8jg=; b=IF+/+u4wYFcIsToGAhtTkpTERH/NXlSNTTq1A/5wG6eGBp7IEpP/tQv3DTnB8s5FOW ryCsnHsgQLTjZEUcNJipm2MHotOtwOxYuyJJffS6QuvehOd+0psTRbv4UeqogQChdRDF 62JGeq54ayHtnwsGy1GcfEdvAUYHEjSOffNt3ywknxcjTvMNQvo3rY7hVNqaq/BzW1WE NkMzV6nHqeRxiXhjuoaritXIQJqerveqC6a7XLBudn0HkbEFL23gv3XiSwZFnxrRnLoT zWtVk/yHDOoK1UOq7wWUzcpcMRH2OtPaMIGL0nMbKXulR9832cVMvAm9BmxsJR/0aL8O 843g== X-Gm-Message-State: AOAM531T33m1RwHmZ078/s6HMebP9H3N8/19HW27yGOUfYl9pg+Ox7ag NWGaLD65i6JKB2ngCMWVGb9u7KQ37UY= X-Google-Smtp-Source: ABdhPJwZ3X7P5+SJ5qYQhPaeIfvurLhjwrBCx0FTIMtQisTDYrMD1WiDC1i4Ydt6iFVK5TWHprIEaw== X-Received: by 2002:adf:bc45:: with SMTP id a5mr12526130wrh.290.1613287819628; Sat, 13 Feb 2021 23:30:19 -0800 (PST) Received: from basil.dsg.cs.tcd.ie ([134.226.36.138]) by smtp.gmail.com with ESMTPSA id s13sm541880wmh.34.2021.02.13.23.30.18 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 13 Feb 2021 23:30:19 -0800 (PST) Message-ID: <6028d18b.1c69fb81.c36c4.1662@mx.google.com> Date: Sat, 13 Feb 2021 23:30:19 -0800 (PST) Content-Type: multipart/alternative; boundary="===============5506622468770085238==" MIME-Version: 1.0 From: Webmaster via GitHub API To: lake@ietf.org Archived-At: Subject: [Lake] Weekly github digest (reqs, edhoc) X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 14 Feb 2021 07:30:23 -0000 --===============5506622468770085238== MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8"; format="flowed" Issues ------ * lake-wg/edhoc (+3/-1/=F0=9F=92=AC15) 3 issues created: - Message_4 (by emanjon) https://github.com/lake-wg/edhoc/issues/70=20 - Make clear that non-ECC signature algorithms are allowed. (by emanjon) https://github.com/lake-wg/edhoc/issues/69=20 - More information about certificate transport (by gselander) https://github.com/lake-wg/edhoc/issues/68=20 7 issues received 15 new comments: - #70 Message_4 (1 by emanjon) https://github.com/lake-wg/edhoc/issues/70=20 - #68 More information about certificate transport (6 by emanjon, gseland= er, petervanderstok) https://github.com/lake-wg/edhoc/issues/68=20 - #67 REST code for EDHOC Error Message as CoAP response (2 by gselander,= marco-tiloca-sics) https://github.com/lake-wg/edhoc/issues/67=20 - #66 Information in test vectors (1 by emanjon) https://github.com/lake-wg/edhoc/issues/66=20 - #56 Rename EDHOC-Exporter-FS (2 by emanjon) https://github.com/lake-wg/edhoc/issues/56=20 - #52 Clarify decryption of CIPHERTEXT_2 (2 by gselander, marco-tiloca-si= cs) https://github.com/lake-wg/edhoc/issues/52 [LAKE interim jan 2021]=20 - #34 How to do encryption without integrity in message_2 (1 by gselander) https://github.com/lake-wg/edhoc/issues/34 [LAKE interim jan 2021]=20 1 issues closed: - Clarify decryption of CIPHERTEXT_2 https://github.com/lake-wg/edhoc/iss= ues/52 [LAKE interim jan 2021]=20 Repositories tracked by this digest: ----------------------------------- * https://github.com/lake-wg/reqs * https://github.com/lake-wg/edhoc --===============5506622468770085238== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Weekly github digest (reqs, edhoc)

Sunday February 14, 2021

Issues

lake-wg/edhoc (+3/-1/=F0=9F=92=AC15)

3 issues created:

7 issues received 15 new comments:

1 issues closed:

Repositories tracked by this digest:
--===============5506622468770085238==-- From nobody Wed Feb 17 01:36:55 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F14D3A18A4 for ; Wed, 17 Feb 2021 01:36:51 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.198 X-Spam-Level: X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NjNnxDM6TAuP for ; Wed, 17 Feb 2021 01:36:49 -0800 (PST) Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E6163A1888 for ; Wed, 17 Feb 2021 01:36:48 -0800 (PST) X-IronPort-AV: E=Sophos;i="5.81,184,1610406000"; d="scan'208,217";a="493429081" Received: from adsl-46-161-92090.crnagora.net (HELO [192.168.100.4]) ([46.161.92.90]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/AES256-GCM-SHA384; 17 Feb 2021 10:36:30 +0100 User-Agent: Microsoft-MacOutlook/10.11.0.180909 Date: Wed, 17 Feb 2021 10:36:28 +0100 From: =?UTF-8?B?TWFsacWhYQ==?= =?UTF-8?B?IFZ1xI1pbmnEhw==?= To: "lake@ietf.org" Message-ID: <98A0B360-7CC8-46BC-ADC4-93D3883A3A53@inria.fr> Thread-Topic: LAKE @ IETF 110: call for agenda items Mime-version: 1.0 Content-type: multipart/alternative; boundary="B_3696402990_1790491343" Archived-At: Subject: [Lake] LAKE @ IETF 110: call for agenda items X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 17 Feb 2021 09:36:54 -0000 > This message is in MIME format. Since your mail reader does not understand this format, some or all of this message may not be legible. --B_3696402990_1790491343 Content-type: text/plain; charset="UTF-8" Content-transfer-encoding: quoted-printable Dear all, =20 The IETF 110 LAKE meeting is scheduled for Tuesday, March 9th 2021, 1200-14= 00 UTC. As it has become usual in the past year, the meeting will be all vir= tual. =20 This email opens a formal call for agenda items. If you would like a slot i= n the agenda to discuss a topic of interest to the working group, please rep= ly to the list or to lake-chairs@ietf.org, specifying: Description of your slot Title Duration requested =20 Please do so by February 26th, 2021. =20 That said, we plan on discussing the status of the EDHOC draft and the open= issues as the main agenda item. We had several interop events in the past s= o we will also use the occasion to bring up to speed people who might now ha= ve followed the interims. =20 Mali=C5=A1a and Stephen =20 --B_3696402990_1790491343 Content-type: text/html; charset="UTF-8" Content-transfer-encoding: quoted-printable

Dea= r all,

 

The IETF 110 LAKE meeting is scheduled for Tuesday= , March 9th 2021, 1200-1400 UTC. As it has become usual in the pa= st year, the meeting will be all virtual.

 

=

This email open= s a formal call for agenda items. If you would like a slot in the agenda to = discuss a topic of interest to the working group, please reply to the list o= r to lake-chairs@ietf.org, specify= ing:

  • Description of your slot
  • <= li class=3DMsoListParagraph style=3D'margin-left:0cm;mso-list:l0 level1 lfo1'>Title
  • Duration requested
  •  <= /o:p>

    Please do so by February 26th, 2021.

     

    That sai= d, we plan on discussing the status of the EDHOC draft and the open issues a= s the main agenda item. We had several interop events in the past so we will= also use the occasion to bring up to speed people who might now have follow= ed the interims.

     

    Mali=C5=A1a and Stephen

     

    --B_3696402990_1790491343-- From nobody Sat Feb 20 23:30:13 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D00F3A15E5 for ; Sat, 20 Feb 2021 23:30:12 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.098 X-Spam-Level: X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qqXLvtQ2wtSf for ; Sat, 20 Feb 2021 23:30:10 -0800 (PST) Received: from mail-wm1-x334.google.com (mail-wm1-x334.google.com [IPv6:2a00:1450:4864:20::334]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 12A0E3A15E4 for ; Sat, 20 Feb 2021 23:30:09 -0800 (PST) Received: by mail-wm1-x334.google.com with SMTP id n10so11509026wmq.0 for ; Sat, 20 Feb 2021 23:30:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=message-id:date:mime-version:from:to:subject; bh=viz7XtQufr8VRp9CvtrFKHKsDrMx2u+gRUsHzD6wAb8=; b=lqiBilg8vBweiNhctcbsdpnrEGQF2+5nyZ8wf39+I8FajiSiHEX8lvwFAd3AX1ej62 /pnUvgYC+lAbg5FAYv9kMXZVmRtmJZWDjLi6XvSs7eG0Lxn8u66wCZ3+KC/2Ex/G+iPS xZdX+v5LfJ8hliAQgATBXuw9zFhBLtIlWxYgqBDs36Q7u81YeRphiAg7S36WSVSXisPb qpD8fMAZG8L2+Et5RlPP1CAtzHbJAWFeyX+YDrMOnZzZgdf+Y3UqFPKQY2BqbO5NPIRl 1Jb0/yaqDNK3GGcHcuLOmeUXMkxq58ZdmlP2A7KokxVl5W8zUZ64PBaeRNvOq4CUB+H7 lmog== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:mime-version:from:to:subject; bh=viz7XtQufr8VRp9CvtrFKHKsDrMx2u+gRUsHzD6wAb8=; b=b8YsAQDLxPAO3O5WiKuANXJX2EW8fkl9mZZfwCqCmoFhdWtSEzzd351KHLaGBffhej PMReDqrAexcerl3Ftjq65c6MtE734WlqiKhae28Zg+krpKvk8mNQz1cXqllYEWMKtPuG 2o0hKTYWkXTEKq05Ziq3V8TWK1rSj/nOCIAGl/0321YfoBERabnBUwtehC+KrpuhJpaV zhmTBiTg8sZ7eoc29QGB91Dcyv5YEVtjCusYztzMlzCMmjFvSyrT3Hua02sJjfbn2h9V TwCzzhO5+dmHKMLIOCTYtcoca0w5QZfdb8lZ8zNXGE0wT+kARGju6WLbJ4xanQMI/cLh f81g== X-Gm-Message-State: AOAM531SJdxEQrziXL0WRjtNK8Pr51vIO+9Kk7rHJrxNkyK4niX0J0m9 QLCNEzfgBVoCfPooaf2O6Btgjm1Jwhc= X-Google-Smtp-Source: ABdhPJxgabxu+9FKUW0g2hq+HVsKcpPXEISizz+18VEFdB6y3qvCbcRSFeR8nBVbJ+Cch0AkBXmBSA== X-Received: by 2002:a7b:cbd4:: with SMTP id n20mr14651526wmi.171.1613892608160; Sat, 20 Feb 2021 23:30:08 -0800 (PST) Received: from basil.dsg.cs.tcd.ie ([134.226.36.138]) by smtp.gmail.com with ESMTPSA id h18sm27053380wrm.54.2021.02.20.23.30.07 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 20 Feb 2021 23:30:07 -0800 (PST) Message-ID: <60320bff.1c69fb81.15dbd.9f8d@mx.google.com> Date: Sat, 20 Feb 2021 23:30:07 -0800 (PST) Content-Type: multipart/alternative; boundary="===============1665097482989445774==" MIME-Version: 1.0 From: Webmaster via GitHub API To: lake@ietf.org Archived-At: Subject: [Lake] Weekly github digest (reqs, edhoc) X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 21 Feb 2021 07:30:12 -0000 --===============1665097482989445774== MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8"; format="flowed" Issues ------ * lake-wg/edhoc (+3/-9/=F0=9F=92=AC22) 3 issues created: - MTI section (by emanjon) https://github.com/lake-wg/edhoc/issues/73=20 - Strange places to mention draft-palombini-core-oscore-edhoc (by emanjon) https://github.com/lake-wg/edhoc/issues/72=20 - Deterministic CBOR encoding of e.g. CBOR intergers (by emanjon) https://github.com/lake-wg/edhoc/issues/71=20 12 issues received 22 new comments: - #70 Message_4 (3 by emanjon, gselander) https://github.com/lake-wg/edhoc/issues/70=20 - #68 More information about certificate transport (2 by emanjon, gseland= er) https://github.com/lake-wg/edhoc/issues/68=20 - #66 Information in test vectors (1 by emanjon) https://github.com/lake-wg/edhoc/issues/66=20 - #61 Change message_1 format (8 by StefanHri, emanjon, marco-tiloca-sics= , mcr, petervanderstok) https://github.com/lake-wg/edhoc/issues/61=20 - #58 Length values when using the Exporter for OSCORE (1 by emanjon) https://github.com/lake-wg/edhoc/issues/58 [LAKE interim jan 2021]=20 - #56 Rename EDHOC-Exporter-FS (1 by emanjon) https://github.com/lake-wg/edhoc/issues/56=20 - #51 Test vector (1 by emanjon) https://github.com/lake-wg/edhoc/issues/51=20 - #50 Add cipher suite with Wei25519 (1 by emanjon) https://github.com/lake-wg/edhoc/issues/50=20 - #43 Redundant Responder private key (1 by emanjon) https://github.com/lake-wg/edhoc/issues/43=20 - #42 Missing Responder private key in test vector. (1 by emanjon) https://github.com/lake-wg/edhoc/issues/42=20 - #34 How to do encryption without integrity in message_2 (1 by emanjon) https://github.com/lake-wg/edhoc/issues/34 [LAKE interim jan 2021]=20 - #11 Agreement of method (1 by emanjon) https://github.com/lake-wg/edhoc/issues/11=20 9 issues closed: - Agreement of method https://github.com/lake-wg/edhoc/issues/11=20 - Test vector https://github.com/lake-wg/edhoc/issues/51=20 - Information in test vectors https://github.com/lake-wg/edhoc/issues/66 = - Update acknowledgements. https://github.com/lake-wg/edhoc/issues/59=20 - Length values when using the Exporter for OSCORE https://github.com/lak= e-wg/edhoc/issues/58 [LAKE interim jan 2021]=20 - Redundant Responder private key https://github.com/lake-wg/edhoc/issues= /43=20 - How to do encryption without integrity in message_2 https://github.com/= lake-wg/edhoc/issues/34 [LAKE interim jan 2021]=20 - Rename EDHOC-Exporter-FS https://github.com/lake-wg/edhoc/issues/56=20 - Missing Responder private key in test vector. https://github.com/lake-w= g/edhoc/issues/42=20 Repositories tracked by this digest: ----------------------------------- * https://github.com/lake-wg/reqs * https://github.com/lake-wg/edhoc --===============1665097482989445774== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Weekly github digest (reqs, edhoc)

    Sunday February 21, 2021

    Issues

    lake-wg/edhoc (+3/-9/=F0=9F=92=AC22)

    3 issues created:

    12 issues received 22 new comments:

    9 issues closed:

    Repositories tracked by this digest:
    --===============1665097482989445774==-- From nobody Mon Feb 22 11:40:36 2021 Return-Path: X-Original-To: lake@ietf.org Delivered-To: lake@ietfa.amsl.com Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A6EC93A1F88; Mon, 22 Feb 2021 11:40:28 -0800 (PST) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit From: internet-drafts@ietf.org To: Cc: lake@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 7.26.0 Auto-Submitted: auto-generated Precedence: bulk Reply-To: lake@ietf.org Message-ID: <161402282863.9719.18068186078461880141@ietfa.amsl.com> Date: Mon, 22 Feb 2021 11:40:28 -0800 Archived-At: Subject: [Lake] I-D Action: draft-ietf-lake-edhoc-05.txt X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 22 Feb 2021 19:40:34 -0000 A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Lightweight Authenticated Key Exchange WG of the IETF. Title : Ephemeral Diffie-Hellman Over COSE (EDHOC) Authors : Göran Selander John Preuß Mattsson Francesca Palombini Filename : draft-ietf-lake-edhoc-05.txt Pages : 90 Date : 2021-02-22 Abstract: This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, perfect forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios and a main use case is to establish an OSCORE security context. By reusing COSE for cryptography, CBOR for encoding, and CoAP for transport, the additional code size can be kept very low. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-lake-edhoc/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-ietf-lake-edhoc-05.html A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-lake-edhoc-05 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From nobody Sat Feb 27 23:30:17 2021 Return-Path: X-Original-To: lake@ietfa.amsl.com Delivered-To: lake@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C81CD3A0BCC for ; Sat, 27 Feb 2021 23:30:15 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.198 X-Spam-Level: X-Spam-Status: No, score=-0.198 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PLeMEr6FHUWJ for ; Sat, 27 Feb 2021 23:30:14 -0800 (PST) Received: from mail-wr1-x42f.google.com (mail-wr1-x42f.google.com [IPv6:2a00:1450:4864:20::42f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 037433A0BCF for ; Sat, 27 Feb 2021 23:30:13 -0800 (PST) Received: by mail-wr1-x42f.google.com with SMTP id r3so12724765wro.9 for ; Sat, 27 Feb 2021 23:30:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=message-id:date:mime-version:from:to:subject; bh=RyWOY40/bf47d+1ziLxD04gYQNAJOmibQkqkP+lcYiA=; b=R2trlsG7agAhxhwOVNKXYRvS5JKRavzxynXD0XH2asN6iABps+s5u5o7RrnfV5BqAn 9Vp1iuvliJEwQdC0wlqrXXrDbzAlMj9W+ZSQIMoOAyFCliuNXfJMC5ZUxSqpbTA5mOHt qY5hwObyd9UkVnTgKuEFzD96V4PBbve2RSB1//KGI282uj4Zc4ObyhxYnyLLYIAb471R 6oBV6Jykli3LOH2VPotR5074ctcFRrAUHqTQUixGLhlnh2G7g1LfIdLNKmqUfrTHlGrJ D1cBDU3jvmqTLTX2UQoZUfXB5l85kvzpm1wlEKlKCQzXapsZ8xrLRhr5nc8EN3Tfy2QB StTg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:date:mime-version:from:to:subject; bh=RyWOY40/bf47d+1ziLxD04gYQNAJOmibQkqkP+lcYiA=; b=c+3iZhMqfDFBlJYUpMtK6EaYEXEo0ca4cY3JLnhzx9SriuNrxP/fhAoA2xFw2Pr7ln 0jwxF+uIuIqyL6QDHjSb4Sr05842tZr6d8qkwVpIlD2NIpwkbvK5PNsgF6ccE+8wzOj5 VvKE1g+cl9qkoF3o26M8X767JaM55pXpNeJIkd57Wz/QOU2KcI50venmcxMioNSW5ifD 3uS3tU0aN3oC2zh9CXgOXdKqrkH0S0ive0WVmpyy2J3pYA+6xHmvfpHhE0CAkOs+096C uIVSlBxR8cWMI0yMwaiQ+jFcAqjgitIE0G4Xi3actZncVRqLyFB+zY13RZexIez1wBvk nwyQ== X-Gm-Message-State: AOAM530lqFIfNjZ+HRfP2Qy7LbYxGL56Kba00pR6npXO7thA9gAdMjlP phY9fOkRfzjSbPhbRuPIk8xO6UTrW5I= X-Google-Smtp-Source: ABdhPJzTnlVcywXwRGwVrru+hFd67X+Pb3kXfCXfoc3K46jpnRtHdeTY9lAuB9qrXH251bQl+HM1dw== X-Received: by 2002:a5d:6b89:: with SMTP id n9mr10801151wrx.74.1614497407309; Sat, 27 Feb 2021 23:30:07 -0800 (PST) Received: from basil.dsg.cs.tcd.ie ([134.226.36.138]) by smtp.gmail.com with ESMTPSA id u63sm13352952wmg.24.2021.02.27.23.30.06 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Sat, 27 Feb 2021 23:30:07 -0800 (PST) Message-ID: <603b467f.1c69fb81.26c39.5762@mx.google.com> Date: Sat, 27 Feb 2021 23:30:07 -0800 (PST) Content-Type: multipart/alternative; boundary="===============7138483804160989009==" MIME-Version: 1.0 From: Webmaster via GitHub API To: lake@ietf.org Archived-At: Subject: [Lake] Weekly github digest (reqs, edhoc) X-BeenThere: lake@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Lightweight Authenticated Key Exchange List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 28 Feb 2021 07:30:16 -0000 --===============7138483804160989009== MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8"; format="flowed" Issues ------ * lake-wg/edhoc (+5/-7/=F0=9F=92=AC15) 5 issues created: - JSON test vector format for automatic parsing (by emanjon) https://github.com/lake-wg/edhoc/issues/78=20 - use of 5chain (by petervanderstok) https://github.com/lake-wg/edhoc/issues/77=20 - appendix b.1.1 (by petervanderstok) https://github.com/lake-wg/edhoc/issues/76=20 - Move 7.2. Transferring EDHOC in CoAP to draft-palombini? (by emanjon) https://github.com/lake-wg/edhoc/issues/75=20 - Classes of Error messages. (by emanjon) https://github.com/lake-wg/edhoc/issues/74=20 14 issues received 15 new comments: - #77 use of 5chain (2 by gselander, petervanderstok) https://github.com/lake-wg/edhoc/issues/77=20 - #76 appendix b.1.1 (1 by gselander) https://github.com/lake-wg/edhoc/issues/76=20 - #74 Classes of Error messages. (1 by gselander) https://github.com/lake-wg/edhoc/issues/74=20 - #70 Message_4 (1 by gselander) https://github.com/lake-wg/edhoc/issues/70=20 - #68 More information about certificate transport (1 by gselander) https://github.com/lake-wg/edhoc/issues/68 [v-05]=20 - #65 Loss of Message_4 (1 by emanjon) https://github.com/lake-wg/edhoc/issues/65=20 - #63 When key-confirmation is needed latest (1 by emanjon) https://github.com/lake-wg/edhoc/issues/63=20 - #61 Change message_1 format (1 by emanjon) https://github.com/lake-wg/edhoc/issues/61=20 - #60 Test vectors comments from Peter (1 by gselander) https://github.com/lake-wg/edhoc/issues/60=20 - #30 What exactly is ERR_MSG and how to distinguish a regular message fr= om an error message (1 by emanjon) https://github.com/lake-wg/edhoc/issues/30 [LAKE interim jan 2021]=20 - #23 Agreement/negotiation of parameters/options (1 by emanjon) https://github.com/lake-wg/edhoc/issues/23=20 - #22 Mandatory to implement cipher suite (1 by malishav) https://github.com/lake-wg/edhoc/issues/22 [LAKE interim jan 2021]=20 - #6 Clarify properties inferred from other crypto (1 by emanjon) https://github.com/lake-wg/edhoc/issues/6=20 - #5 Clarify assumptions regarding use of TEE (1 by emanjon) https://github.com/lake-wg/edhoc/issues/5=20 7 issues closed: - Message_4 https://github.com/lake-wg/edhoc/issues/70=20 - More information about certificate transport https://github.com/lake-wg= /edhoc/issues/68 [v-05]=20 - use of 5chain https://github.com/lake-wg/edhoc/issues/77=20 - Agreement/negotiation of parameters/options https://github.com/lake-wg/= edhoc/issues/23=20 - What exactly is ERR_MSG and how to distinguish a regular message from a= n error message https://github.com/lake-wg/edhoc/issues/30 [LAKE interim ja= n 2021]=20 - Clarify properties inferred from other crypto https://github.com/lake-w= g/edhoc/issues/6=20 - Clarify assumptions regarding use of TEE https://github.com/lake-wg/edh= oc/issues/5=20 Repositories tracked by this digest: ----------------------------------- * https://github.com/lake-wg/reqs * https://github.com/lake-wg/edhoc --===============7138483804160989009== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Weekly github digest (reqs, edhoc)

    Sunday February 28, 2021

    Issues

    lake-wg/edhoc (+5/-7/=F0=9F=92=AC15)

    5 issues created:

    14 issues received 15 new comments:

    7 issues closed:

    Repositories tracked by this digest:
    --===============7138483804160989009==--