+1. Completely agree with the text. Regards, Savio.
-- *Savio Sciancalepore, Ph.D. Student* DEI, Politecnico di Bari via Orabona 4 - 70125 (Bari), Italy. email: [email protected] <[email protected]> phone: +39 080 5963301 web: http://telematics.poliba.it/sciancalepore <http://telematics.poliba.it/index.php/en/people/sciancalepore> 2015-05-11 6:24 GMT+02:00 Xavier Vilajosana <[email protected]>: > Dear all, > > after the last call we would like to close the security section in > minimal. We wrapped up all comments from the previous days and from the > meeting and here is our proposal: > > This draft assumes the existence of two cryptographic keys, K1 and > K2. EBs SHOULD be authenticated with key K1. DATA, ACKNOWLEDGEMENT, and > MAC COMMAND frame types SHOULD be authenticated and encrypted with key K2. > For early interoperability, K1 MAY be set to "6TiSCH minimal15". K2 SHOULD > be a randomly generated high entropy cryptographic key. Key distribution > is out of scope. > > I would like to encourage everybody to see if this texts covers all what > we want for minimal, and provide consensus. We need to move forward. > > kind regards, > Xavi > > _______________________________________________ > 6tisch mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/6tisch > > -- *Savio Sciancalepore, Ph.D. Student* DEI, Politecnico di Bari via Orabona 4 - 70125 (Bari), Italy. email: [email protected] <[email protected]> phone: +39 080 5963301 web: http://telematics.poliba.it/sciancalepore <http://telematics.poliba.it/index.php/en/people/sciancalepore>
_______________________________________________ 6tisch mailing list [email protected] https://www.ietf.org/mailman/listinfo/6tisch
