This is my proposed text for all of section 8. This does not force anyone to
use well-known keys, or 32 bit MICs, or send EBs unencrypted.
It does make it easy to do interop.
People who want to use pre-configured secret keys, long MICs, encrypted EBs,
or no keys at all, are free to do so.

ksjp
---------------
8.    Security
Minimal assumes the existence of two keys, K1 and K2.  EBs MAY be
authenticated with key K1 using security level 1 (32 bit MIC).
DATA, ACKNOWLEDGEMENT, and MAC COMMAND frame types SHOULD be
authenticated with key K2 using security level 1.

For early interoperability, K1 MAY be set to "6TiSCH minimal15". K2 SHOULD
be a randomly generated high entropy cryptographic key.
Key distribution is out of scope.  EBs MAY be filtered based on PANID.


_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to