Yes, Don. 

So far I have not seen any 6TiSCH implementation using 802.15.9 but I guess it 
could be added. If people did try please let us now, now is a good time.
It results that at the moment we do not have text on 15.9 at all. It seems a 
bit late to add it now.

What do others think?

All the best,

Pascal

> -----Original Message-----
> From: Don Sturek <[email protected]>
> Sent: mardi 20 août 2019 22:17
> To: Michael Richardson <[email protected]>; Pascal Thubert (pthubert)
> <[email protected]>; Benjamin Kaduk <[email protected]>; Mališa Vučinić
> <[email protected]>; Tero Kivinen <[email protected]>; [email protected]
> Subject: Re: [6tisch] rekeying the 6TiSCH network
> 
> Š. On the rekeying topic for IEEE 802.15.4.
> 
> Have a look at IEEE 802.15.9.   It takes existing key establishment
> protocols (IEEE 802.1x, etc.) and provides encapsulation over IEEE 802.15.4.
> 
>  IEEE 802.15.9 does not solve all of your rekey needs but the tools are there
> when you agree on how you want rekeying to work.
> 
> Don
> 
> 
> 
> On 8/20/19, 1:03 PM, "6tisch on behalf of Michael Richardson"
> <[email protected] on behalf of [email protected]> wrote:
> 
> >
> >Pascal Thubert (pthubert) <[email protected]> wrote:
> >    > I'm looking for a consensus on how to address the following review
> >    > comment on the 6TiSCH Architecture by Benjamin:
> >
> >    >> It would be good to see some architectural discussion about key
> >    >> management
> >    >> for the link-layer keys.  (Given that 802.15.4 leaves key
> >management
> >    >> as out of
> >    >> scope, it is clearly our problem.)  Thus far I don't even have a
> >sense
> >    >> for when it is
> >    >> possible to rotate a network's keys.
> >
> >    PT> I'll take that to a separate thread with Michael, Tero and
> >Malisa. It
> >    PT> is certainly possible to rotate keys. We had a draft about
> >rekeying
> >    PT> that went stale. We isolated cases where this is desirable in the
> >    PT> discussion on the minimal security draft. I'm unclear how deep we
> >    PT> need to go in this regards vs. what belongs to the minimal
> >security
> >    PT> specification.
> >
> >6tisch-minimal-security has a section 8.2 "Parameter Update Exchange"
> >Maybe it should include "(and Rekey)"
> >
> >We further have section 8.4.3.1 and 8.4.3.2 to explain how to use that
> >to rekey the entire network.
> >
> >I'm not sure what's in the Architecture document about this, but I'd
> >rather that it just said less.
> >
> >--
> >Michael Richardson <[email protected]>, Sandelman Software Works
> >-= IPv6 IoT consulting =-
> >
> >
> >
> >_______________________________________________
> >6tisch mailing list
> >[email protected]
> >https://www.ietf.org/mailman/listinfo/6tisch
> 

_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to