HI ACE ML! We just updated a new I-D. "Lightweight Authenticated Time (LATe) Synchronization Protocol"
The document defines a secure time synchronization protocol for constrained environments; the protocol is first described from an abstract point on view and later is also mapped on top of the ACE architecture. The goal is to define the simplest yet-'secure' protocol for time synchronization possible. The need for a secure source of time is getting clearer on ACE (either that, or mechanisms to assure freshness of each transaction), and we hope that with this protocol we are giving the first step to come up with a constrained-resource friendly solution. The base protocol definition, I hope, can be read fast and in an easy way. Feedback will be very appreciated! Security is not optional nor approximate, so further work will be done in analyzing/testing the security properties and attacks of the base protocol. Regards, Renzo ---------- Forwarded message ---------- From: <[email protected]> Date: Mon, Oct 31, 2016 at 3:05 PM Subject: New Version Notification for draft-navas-ace-secure-time-synchronization-00.txt To: Ludwig Seitz <[email protected]>, Renzo Navas <[email protected]>, Goeran Selander <[email protected]> A new version of I-D, draft-navas-ace-secure-time-synchronization-00.txt has been successfully submitted by Renzo Navas and posted to the IETF repository. Name: draft-navas-ace-secure-time-synchronization Revision: 00 Title: Lightweight Authenticated Time (LATe) Synchronization Protocol Document date: 2016-10-31 Group: Individual Submission Pages: 20 URL: https://www.ietf.org/internet-drafts/draft-navas-ace-secure-time-synchronization-00.txt Status: https://datatracker.ietf.org/doc/draft-navas-ace-secure-time-synchronization/ Htmlized: https://tools.ietf.org/html/draft-navas-ace-secure-time-synchronization-00 Abstract: This documents defines the Lightweight Authenticated Time (LATe) Synchronization Protocol, a secure time synchronization protocol for constrained environments. The messages are encoded using Concise Binary Object Representation (CBOR) and basic security services are provided by CBOR Object Signing and Encryption (COSE). A secure source of time is a base assumption for many other services, including security services. LATe Synchronization protocol enables these time-dependent services to run in the context of a constrained environment. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat _______________________________________________ Ace mailing list [email protected] https://www.ietf.org/mailman/listinfo/ace
