Dear Dan and Rafa, Just checking in to let you know that we are working through your replies below and are most of the way through them. We plan to send you an email on 4 August, with links to the latest files for your review.
Thank you for your patience! RFC Editor/lb > On Jul 29, 2025, at 10:09 AM, Dan Garcia Carrillo <garcia...@uniovi.es> wrote: > > Dear RFC Editor, > Please see answers inline. For the requested clarifications in Figures, we > attach a .xml version with the figures updated. > Please, let us know if anything else is required. > > El 18/7/25 a las 19:53, rfc-edi...@rfc-editor.org escribió: >> Authors and AD*, >> >> *AD, please see question #1 below. >> >> Authors, while reviewing this document during AUTH48, please resolve (as >> necessary) the following questions, which are also in the XML file. >> >> >> 1) <!-- [rfced] *AD, text was added to the Acknowledgements section after the >> document was approved for publication. Please review the changes and >> let us know if you approve. >> >> Diff between v14 and v15: >> https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH77QRYqZw$ >> >> --> >> >> >> 2) <!-- [rfced] Please note that the title of the document has been updated >> as >> follows. We expanded abbreviations per Section 3.6 of RFC 7322 ("RFC >> Style Guide"), recast "-based" to avoid using a hyphen with an expansion, >> and added "for Use with". Please review. >> >> Original: >> EAP-Based Authentication Service for CoAP >> >> Current: >> Authentication Service Based on the Extensible Authentication Protocol (EAP) >> for Use with the Constrained >> Application Protocol (CoAP) >> --> >> > [Authors] This change is ok. >> >> >> 3) <!-- [rfced] Please insert any keywords (beyond those that appear in the >> title) for use on >> <https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7N7e55Gg$ >> >. --> >> > [Authors] We believe that these could be keywords representing the work: > > CoAP, EAP, EAP lower layer, Internet of Things, IoT, Constrained Node, Smart > Object > >> >> 4) <!-- [rfced] Abstract: We had trouble following the meaning of >> "transported" in this sentence. If the suggested text is not >> correct, please provide clarifying text. >> >> Original: >> This document specifies an authentication service that uses the >> Extensible Authentication Protocol (EAP) transported employing >> Constrained Application Protocol (CoAP) messages. >> >> Suggested: >> This document specifies an authentication service that uses the >> Extensible Authentication Protocol (EAP) as a transport method that >> employs Constrained Application Protocol (CoAP) messages. --> >> > [Authors] The suggested text can be misleading as the protocol being carried > is EAP and the one that carries EAP is CoAP. > Next, our suggested text would be: > This document specifies an authentication service that uses the > Constrained Application Protocol (CoAP) as a transport method to > carry the Extensible Authentication Protocol (EAP). > > >> >> 5) <!-- [rfced] We found quite a few undefined abbreviations in this >> document. For ease of the reader, we expanded as many of them as we >> could find. Most were straightforward (e.g., SAML per RFC 7833, >> PANA per RFC 5191), but please confirm that our expansions for MIC >> (currently "Message Integrity Check") and LoRa (currently "Long >> Range") are correct. >> >> Original: >> EAP relies on lower layer error >> detection (e.g., CRC, checksum, MIC, etc.). >> ... >> Given that EAP is also used for network access authentication, this >> service can be adapted to other technologies. For instance, to >> provide network access control to very constrained technologies >> (e.g., LoRa network). >> >> Currently (fixed the incomplete sentence in the "LoRa" text): >> EAP relies on lower-layer error >> detection (e.g., CRC, checksum, Message Integrity Check (MIC), >> etc.). >> ... >> Given that EAP is also used for network access authentication, this >> service can be adapted to other technologies - for instance, to >> provide network access control to very constrained technologies >> (e.g., Long Range (LoRa) networks). --> >> > [Authors] Yes, these suggestions are correct. > >> >> 6) <!-- [rfced] Section 2: These sentences did not parse. We updated >> the text. If this is incorrect, please provide clarifying text. >> >> Original: >> The rationale behind this decision >> is that EAP requests direction is always from the EAP server to the >> EAP peer. Accordingly, EAP responses direction is always from the >> EAP peer to the EAP server. >> >> Currently: >> The rationale behind this decision is that EAP requests will always >> travel from the EAP server to the EAP peer. Accordingly, EAP >> responses will always travel from the EAP peer to the EAP server. --> >> >> > [Authors] Yes, these suggestions are correct. > > >> 7) <!-- [rfced] Please review each artwork element. Should any artwork >> element be tagged as sourcecode? If the current list of preferred >> values for "type" on >> <https://urldefense.com/v3/__https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5spEm40g$ >> > >> does not contain an applicable type, please let us know. Also, it is >> acceptable to leave the "type" attribute unset. --> >> > [Authors] We assume that this is in reference to "Figure 6: CBOR Data > Structure for CoAP-EAP". > It is not our intention to specify sourcecode, it could be left as type unset. > >> >> 8) <!-- [rfced] Figure 1: We see "(SCOPE OF THIS DOCUMENT)" in the >> ASCII art but "SCOPE OF THIS DOCUMENT" in the SVG. If you prefer the >> parentheses, please correct the SVG in the edited copy of the XML. >> If you prefer that the parentheses be removed, let us know, and we >> will update the ASCII art accordingly. --> >> >> > [Authors] There are no need for parentheses, the message is clear without > them. > >> 9) <!-- [rfced] Figure 2: We changed "Request/Responses/Signaling" to >> "Request / Responses / Signaling", to match the spacing style of the >> other entries in the figure. However, the "Request / Responses / >> Signaling" line now looks a bit crowded in the SVG renderings in the >> HTML and PDF output files. We cannot determine where in the SVG a >> coordinate should be modified to correct the spacing. Please correct >> the SVG in the edited copy of the XML. --> >> > [Authors] The line should say > Requests / Responses / Signaling > > We have provided a new <artwork> code in the attached document > rfc9820_modified.xml that is not so crowded and tries to convey the > improvements. > This is also updated in svg in the attached file rfc9820_modified.xml > >> >> 10) <!-- [rfced] Sections 3.1 and subsequent: We see phrases such as >> "an intermediary proxy", "intermediary (i.e., proxy)", and >> "intermediaries such as proxies" in this document. Will the >> distinction regarding whether or not intermediaries are sometimes or >> always proxies be clear to readers? --> >> > [Authors] We are following CoAP terminology, being according to rfc7252 > Intermediary > A CoAP endpoint that acts both as a server and as a client towards an > origin server (possibly via further intermediaries). A common form of an > intermediary is a proxy; several classes of such proxies are discussed in > this specification. > Maybe the following modifications would make this clearer to the reader. > 3.1. Discovery > Before the CoAP-EAP exchange takes place, the EAP peer needs to discover > the EAP authenticator or the entity that will enable the CoAP-EAP exchange > (e.g.i.e., an intermediary proxy). > —- > 8.3. Allowing CoAP-EAP Traffic to Perform Authentication > Since CoAP is an application protocol, CoAP-EAP assumes certain IP > connectivity in the link between the EAP peer and the EAP authenticator to > run. This link MUST authorize exclusively unprotected IP traffic to be sent > between the EAP peer and the EAP authenticator during the authentication with > CoAP-EAP. Once the authentication is successful, the key material generated > by the EAP authentication (MSK) and any other traffic can be authorized if it > is protected. It is worth noting that if the EAP authenticator is not in the > same link as the EAP peer and an intermediate entity (i.e.e.g., a CoAP proxy) > helps with this process, this concept also applies to the communication > between the EAP peer and the intermediary. > —- > When the EAP peer intends to be admitted into the network, it would search > for an entity that offers the CoAP-EAP service, be it directly via the EAP > authenticator or through an intermediary (i.e.e.g., proxy). See Section 3.1. > — > If the EAP peer cannot connect to the EAP authenticator directly, the EAP > peer can follow the same process as that described in Section 3.6 to perform > the authentication (i.e., can connect via an intermediary entity (e.g., > proxy) that is already part of the network (already shares key material and > communicates through a secure channel with the authenticator) and can aid in > running CoAP-EAP). > — > When CoAP-EAP is completed and the OSCORE security association is > established with the EAP authenticator, the EAP peer receives the local > configuration parameters for the network (e.g., a network key) and can > configure a global IPv6 address. Moreover, there is no need for a CoAP proxy > an intermediary entity after a successful authentication. > >> >> 11) <!-- [rfced] Section 3.1: This sentence does not parse. If neither >> suggestion below is correct, please clarify the meaning of "hence". >> >> Original: >> For >> example, on a 6LoWPAN network, the Border Router will typically act >> as the EAP authenticator hence, after receiving the Router >> Advertisement (RA) messages from the Border Router, the EAP peer may >> engage on the CoAP-EAP exchange. >> >> Suggestion #1: >> For >> example, in a 6LoWPAN network, the Border Router will henceforth >> typically act as the EAP authenticator. After receiving the Router >> Advertisement (RA) messages from the Border Router, the EAP peer may >> engage in the CoAP-EAP exchange. >> >> Suggestion #2: >> For >> example, in a 6LoWPAN network, the Border Router will typically act >> as the EAP authenticator. Hence, after receiving the Router >> Advertisement (RA) messages from the Border Router, the EAP peer may >> engage in the CoAP-EAP exchange. --> >> > [Authors] Suggestion #2 > >> >> 12) <!-- [rfced] Section 3.2: Please confirm that the "Implementation >> notes" paragraph and bullet list should remain independent of Step 0 >> (i.e., should not be indented so that it is part of Step 0). We see >> "resource of a step of the authentication" in the text, which seems >> to indicate that this information applies to all steps and not just >> Step 0, but we would still like you to confirm that the current >> indentation levels are correct. >> >> Original: >> * Step 0. The EAP peer MUST start the CoAP-EAP process by sending a >> "POST /.well-known/coap-eap" request (trigger message). This >> message carries the 'No-Response' [RFC7967] CoAP option to avoid >> waiting for a response that is not needed. This is the only >> message where the EAP authenticator acts as a CoAP server and the >> EAP peer as a CoAP client. The message also includes a URI in the >> payload of the message to indicate the resource where the EAP >> authenticator MUST send the next message. The name of the >> resource is selected by the CoAP server. >> >> Implementation notes: When generating the URI for a resource of a >> step of the authentication, the resource could have the following >> format as an example "path/eap/counter", where: >> >> * "path" is some local path on the device to make the path unique. >> This could be omitted if desired. >> >> * "eap" is the name that indicates the URI is for the EAP peer. >> This has no meaning for the protocol but helps with debugging. >> >> * "counter' which is an incrementing unique number for every new EAP >> request. >> >> So, in Figure 3 for example, the URI for the first resource would be >> “a/eap/1" >> >> * Step 1. ... --> >> > [Authors] Yes, the "Implementation notes" paragraph and bullet list should > remain independent of Step 0 > >> >> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the >> EAP peer or the EAP peer state machine? If the suggested text is not >> correct, please provide clarifying text. >> >> Original (previous text is included for context): >> * Step 2. The EAP peer processes the POST message sending the EAP >> request (EAP-Req/Id) to the EAP peer state machine, which returns >> an EAP response (EAP Resp/Id). Then, assigns a new resource to >> the ongoing authentication process (e.g., '/a/eap/2'), and deletes >> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created' >> response with the new resource identifier in the Location-Path >> (and/or Location-Query) options for the next step. >> >> Suggested (guessing the EAP peer state machine): >> * Step 2. The EAP peer processes the POST message, sending the EAP >> request (EAP-Req/Id) to the EAP peer state machine, which returns >> an EAP response (EAP Resp/Id). Then, the EAP peer state machine >> assigns a new resource to the ongoing authentication process >> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1'). >> Finally, the EAP peer state machine sends a '2.01 Created' >> response with the new resource identifier in the Location-Path >> (and/or Location-Query) options for the next step. --> >> > [Authors] We believe the best way to specify this is to differentiate between > "EAP peer state machine" and the CoAP-EAP application of the EAP peer. > The EAP peer state machine only deals with EAP messages. Processes EAP > requests and returns an EAP response. > With that, the CoAP-EAP application within the EAP peer takes control and > manages everything CoAP related. Assigns a new resource to the ongoing > authentication process (e.g., '/a/eap/2') and deletes the previous one > ('/a/eap/1') > So, a suggested new text. > Step 2. The EAP peer processes the POST message sending the EAP > request (EAP-Req/Id) to the EAP peer state machine, which returns > an EAP response (EAP Resp/Id). Then, the CoAP-EAP application > assigns a new resource to the ongoing authentication process > (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1'). > Finally, sends a '2.01 Created'response with the new resource > identifier in the Location-Path (and/or Location-Query) options > for the next step. > > >> >> 14) <!-- [rfced] Section 3.2: Please clarify the meaning of "response to >> carry the EAP response" in this sentence. >> >> Original: >> The EAP peer will use a response to carry the EAP response in the >> payload. --> >> > [Authors] The text should say: > The EAP peer will use a CoAP response to carry the EAP response in the > payload. > >> >> 15) <!-- [rfced] Section 3.5: The second sentence was incomplete and >> difficult to follow. Per Sections 3.5.1 through 3.5.3, we updated >> this section as noted below. If this is incorrect, please clarify. >> >> Original: >> This section elaborates on how different errors are handled. From >> EAP authentication failure, a non-responsive endpoint lost messages, >> or an initial POST message arriving out of place. >> >> Currently: >> This section elaborates on how different errors are handled: EAP >> authentication failure (Section 3.5.1), a non-responsive endpoint >> (Section 3.5.2), and duplicated messages (Section 3.5.3). --> >> > [Authors] The suggested text is ok. > > >> >> 16) <!-- [rfced] Section 3.5.2: We could not follow the meaning of this >> run-on sentence. If the suggested text is not correct, please >> provide clarifying text. >> >> Original: >> By default, CoAP-EAP adopts the >> value of EXCHANGE_LIFETIME as a timer in the EAP peer and >> Authenticator to remove the CoAP-EAP state if the authentication >> process has not progressed in that time, in consequence, it has not >> been completed. >> >> Suggested: >> By default, CoAP-EAP adopts the >> value of EXCHANGE_LIFETIME as a timer in the EAP peer and >> authenticator to remove the CoAP-EAP state if the authentication >> process has not progressed to completion during that time. --> >> > [Authors] The suggested text is ok. > >> >> 17) <!-- [rfced] Section 3.5.3: Does "Step 0" here refer to Step 0 in >> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest >> adding a citation for the appropriate figure. >> >> Original: >> The reception of the trigger message in Step 0 containing the URI >> /coap-eap needs some additional considerations, as the resource is >> always available in the EAP authenticator. --> >> > [Authors] This first instance of Step 0 is referring to the complete Flow in > Figure 3. > The last instance refers to Figure 5. > For clarity the text would be: > The reception of the trigger message (Step 0 in Figure 3) containing the URI > /coap-eap needs some additional considerations, as the resource is always > available in the EAP authenticator. > If a trigger message arrives at the EAP authenticator during an ongoing > authentication with the same EAP peer, the EAP authenticator MUST silently > discard this trigger message. > If an old "POST /.well-known/coap-eap" (Step 0 in Figure 5) arrives at the > EAP authenticator and there is no authentication ongoing, the EAP > authenticator may understand that a new authentication process is requested. > Consequently, the EAP authenticator will start a new EAP authentication. > However, if the EAP peer did not start any authentication and therefore, it > did not select any resource for the EAP authentication. Thus, the EAP peer > sends a '4.04 Not Found' in the response. > >> >> 18) <!-- [rfced] Section 3.5.3: The "However, if ..." sentence is >> incomplete; it appears that some words are missing. Please clarify >> this text. >> >> Original (the previous and next sentences are included for context): >> Consequently, the EAP authenticator will start a new EAP >> authentication. However, if the EAP peer did not start any >> authentication and therefore, it did not select any resource for the >> EAP authentication. Thus, the EAP peer sends a '4.04 Not found' in >> the response (Figure 5). --> >> > [Authors] Maybe this is simpler, > “However, if the EAP peer did not start any authentication, it will send a > '4.04 Not found' in the response (Figure 5).” >> >> 19) <!-- [rfced] Section 3.6: The following sentences do not parse. >> >> If the suggested text for the first sentence is not correct, please >> provide clarifying text. >> >> We cannot follow the meaning of the second sentence. Please clarify >> "the proxy will act as forward, and as reverse for the rest". >> >> Original (the first sentence is included for context): >> After that, in the >> remaining exchanges the roles are reversed, being the EAP peer, the >> CoAP server, and the EAP authenticator, the CoAP client. When using >> a proxy in the exchange, for message 0, the proxy will act as >> forward, and as reverse for the rest. >> >> Suggested (first sentence): >> In the remaining exchanges, the roles are reversed (i.e., the EAP >> peer acts as the CoAP server, and the EAP authenticator acts as the >> CoAP client). --> >> > [Authors] The text would be the following, hopefully it is clearer: > In the remaining exchanges, the roles are reversed (i.e., the EAP > peer acts as the CoAP server, and the EAP authenticator acts as the > CoAP client). When using a proxy in the exchange, for message 0 it will act > as a forward proxy, and as a reverse proxy for the rest. >> >> 20) <!-- [rfced] Section 5: We found this sentence confusing, because >> the plural "Examples" is used but the text that follows shows an >> "either-or" relationship ("cipher suites that need to be negotiated >> or ..."). If the suggested text is not correct, please provide >> clarifying text. >> >> Original (the previous sentence is included for context): >> In the CoAP-EAP exchange, there is information that needs to be >> exchanged between the two entities. Examples of this information are >> the cipher suites that need to be negotiated or authorization >> information (Session-lifetime). >> >> Suggested: >> In the CoAP-EAP exchange, information needs to be exchanged between >> the two entities - for example, the cipher suites that need to be >> negotiated, or authorization information (Session-lifetime). --> >> > [Authors] The suggested text is ok. > > >> >> 21) <!-- [rfced] Section 5: Per Figure 6, Table 4, and >> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ >> >, we moved the RID-I item >> so that it is the third item (Label 3, per Figure 6, Table 4, and >> IANA) instead of the second; RID-C is now the second item. >> Please let us know any objections. >> >> Original: >> 2. RID-I: Is the Recipient ID of the EAP peer. The EAP >> authenticator uses this value as a Sender ID for its OSCORE >> Sender Context. The EAP peer uses this value as Recipient ID for >> its Recipient Context. >> >> 3. RID-C: Is the Recipient ID of the EAP authenticator. The EAP >> peer uses this value as a Sender ID for its OSCORE Sender >> Context. The EAP authenticator uses this value as Recipient ID >> for its Recipient Context. >> >> Currently: >> 2. RID-C: The Recipient ID of the EAP authenticator. The EAP peer >> uses this value as the Sender ID for its OSCORE Sender Context. >> The EAP authenticator uses this value as the Recipient ID for its >> Recipient Context. >> >> 3. RID-I: The Recipient ID of the EAP peer. The EAP authenticator >> uses this value as the Sender ID for its OSCORE Sender Context. >> The EAP peer uses this value as the Recipient ID for its >> Recipient Context. --> >> > [Authors] No objection. > > >> >> 22) <!-- [rfced] Section 6.1: Does "Steps 1 and 2" here refer to >> Steps 1 and 2 in Figure 3 or Steps 1 and 2 in Figure 8? >> For ease of the reader, we suggest adding a citation for the >> appropriate figure. >> >> Original: >> OSCORE runs after the EAP authentication, using the cipher suite >> selected in the cipher suite negotiation (Steps 1 and 2). --> >> > [Authors] We refer to Figure 3 in the first instance. To Figure 8 in the > other instances in that section. Corrected text below: > OSCORE runs after the EAP authentication, using the cipher suite selected in > the cipher suite negotiation (Steps 1 and 2 in Figure 3). To negotiate the > cipher suite, CoAP-EAP follows a simple approach: The EAP authenticator sends > a list, in decreasing order of preference, with the identifiers of the > supported cipher suites (Step 1 in Figure 8). In the response to that message > (Step 2 in Figure 8), the EAP peer sends its choice. > > >> >> 23) <!-- [rfced] Section 6.1: We had trouble following this sentence. >> If the suggested text is not correct, please clarify "where it can be >> appreciated the disposition". >> >> Original: >> An example of the exchange with the >> cipher suite negotiation is shown in Figure 8, where it can be >> appreciated the disposition of both EAP-Request/Identity and EAP- >> Response/Identity, followed by the CBOR object defined in Section 5, >> containing the cipher suite field for the cipher suite negotiation. >> >> Suggested: >> An example exchange for the >> cipher suite negotiation is shown in Figure 8. The >> EAP request (EAP-Request/Identity) and EAP response >> (EAP-Response/Identity) are sent; both messages include the CBOR >> object (Section 5) containing the cipher suite field for the cipher >> suite negotiation. --> >> > [Authors] The suggested text is ok > > > >> >> 24) <!-- [rfced] Figure 7: We note that the ASCII art has two pipes (with "+" >> above each) between the "Data" and "cipher suites" fields, while the SVG >> has vertical lines along with curved lines that intersect each >> other. Please review and correct the edited copy of the XML if needed. >> --> >> > [Authors] We provided a new Figure in the xml attached file that hopefully is > much more clearer. > >> >> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need >> to be numbered? If yes, will this numbering scheme be clear to >> readers? >> >> Original: >> * 0) AES-CCM-16-64-128, SHA-256 (default) >> >> * 1) A128GCM, SHA-256 >> >> * 2) A256GCM, SHA-384 >> >> * 3) ChaCha20/Poly1305, SHA-256 >> >> * 4) ChaCha20/Poly1305, SHAKE256 >> ... >> * 5) TLS_SHA256 >> >> * 6) TLS_SHA384 >> >> * 7) TLS_SHA512 >> >> Perhaps: >> * AES-CCM-16-64-128, SHA-256 (default) >> >> * A128GCM, SHA-256 >> >> * A256GCM, SHA-384 >> >> * ChaCha20/Poly1305, SHA-256 >> >> * ChaCha20/Poly1305, SHAKE256 >> ... >> * TLS_SHA256 >> >> * TLS_SHA384 >> >> * TLS_SHA512 >> >> --> >> > [Authors] The numbers on Sections 6.1 match the values in “9.1. CoAP-EAP > Cipher Suites”. > The numbers in Appendix A are the expected continuation of these, but are not > in the specification, and not in the IANA section. This text should also > solve issue 42 as well. > Suggested update text: > The following hash algorithms are considered in case the specification > includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) > >> >> 26) <!-- [rfced] Section 6.2: Does "Steps 7 and 8" here refer to >> Steps 7 and 8 in Figure 3? If yes, for ease of the reader we suggest >> adding a citation for Figure 3. >> >> Original: >> The derivation of the security context for OSCORE allows securing the >> communication between the EAP peer and the EAP authenticator once the >> MSK has been exported, providing confidentiality, integrity, key >> confirmation (Steps 7 and 8), and downgrading attack detection. --> >> > [Authors] Yes, we refer to Figure 3. > >> >> 27) <!-- [rfced] Section 6.2: We clarified these sentences as noted >> below. If these updates are incorrect, please clarify "the cipher >> suite 0". >> >> Original: >> If CS-C or CS-I were not sent, (i.e., default algorithms are used) >> the value used to generate CS will be the same as if the default >> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR >> array with the cipher suite 0). >> ... >> If CS-C or CS-I were not sent, (i.e., default algorithms are used) >> the value used to generate CS will be the same as if the default >> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR >> array with the cipher suite 0). >> >> Currently: >> If neither CS-C nor CS-I was sent (i.e., default algorithms are >> used), the value used to generate CS will be the same as if the >> default algorithms were explicitly sent in CS-C or CS-I (i.e., a >> CBOR array with the cipher suite value of 0). >> ... >> If neither CS-C nor CS-I was sent (i.e., default algorithms are >> used), the value used to generate CS will be the same as if the >> default algorithms were explicitly sent in CS-C or CS-I (i.e., a >> CBOR array with the cipher suite value of 0). --> >> > [Authors] The suggested text is ok. > > >> >> 28) <!-- [rfced] Please review instances of the term "NULL" as used in this >> document and let us know if any updates are needed. We believe that >> "NULL" should be updated to either "NUL" (that is, referring to the >> specific ASCII control code) or "null". --> >> > [Authors] We mean the same as the instance you can find in rfc5191 of PANA > page 16 > - "IETF PANA" is the ASCII code representation of the non-NULL terminated > string (excluding the double quotes around it). > > >> >> 29) <!-- [rfced] Section 7.1: We changed this text as noted below. >> Please review carefully (including our expansion of "AVP" for ease of >> the reader), and let us know if anything is incorrect. >> >> Original: >> Note: When EAP >> is proxied over an AAA framework, the Access-Request packets in >> RADIUS MUST contain a Framed-MTU attribute with the value 1024, and >> the Framed-MTU AVP to 1024 in DIAMETER This attribute signals the AAA >> server that it should limit its responses to 1024 octets. >> >> Currently: >> Note: When EAP is proxied over a AAA framework, the >> Access-Request packets in RADIUS MUST contain a Framed-MTU >> attribute with a value of 1024 and, in Diameter, the Framed-MTU >> Attribute-Value Pair (AVP) with a value of 1024. This information >> signals the AAA server that it should limit its responses to 1024 >> octets. --> >> > [Authors] The suggested text is ok. > > >> >> 30) <!-- [rfced] Section 7.2: This sentence is difficult to parse. If >> the suggested text is not correct, please rephrase "constrained >> devices and network scenarios" and "older versions with the goal of >> economization". >> >> Also, please review and let us know whether this "Note:" item that is >> set off in a separate paragraph should be in the <aside> element. >> <aside> is defined as "a container for content that is semantically >> less important or tangential to the content that surrounds it" >> (https://urldefense.com/v3/__https://authors.ietf.org/en/rfcxml-vocabulary*aside__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5DOBldVg$ >> ). >> >> Original: >> Note: For constrained devices and network scenarios, the use of the >> latest versions of EAP methods (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 >> [RFC9190]) is recommended in favor of older versions with the goal of >> economization, or EAP methods more adapted for IoT (e.g., EAP-NOOB >> [RFC9140], EAP-EDHOC [I-D.ietf-emu-eap-edhoc], etc.). >> >> Suggested: >> Note: To improve efficiency in environments with >> constrained devices and networks, the latest versions of EAP methods >> (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 [RFC9190]) are recommended over >> older versions. EAP methods more adapted for IoT networks (e.g., >> EAP-NOOB [RFC9140], EAP-EDHOC [EAP-EDHOC], etc.) are also >> recommended. --> >> > [Authors] The suggested text is ok. > > >> >> 31) <!-- [rfced] Section 8.2: This sentence did not parse. We updated >> it as noted below. If this update is incorrect, please clarify >> "can be with the transport of SAML". >> >> Original: >> Providing more fine-grained >> authorization data can be with the transport of SAML in RADIUS >> [RFC7833]. >> >> Currently: >> Providing more fine-grained >> authorization data can be done by transporting the data using the >> Security Assertion Markup Language (SAML) in RADIUS [RFC7833]. --> >> > [Authors] Currently suggested text is ok. >> >> >> 32) <!-- [rfced] Section 8.3: >> >> a) To what does "exclusively" refer in this sentence? If the >> suggested text is not correct, please clarify. >> >> Original (the previous sentence is included for context): >> Since CoAP is an application protocol, CoAP-EAP assumes certain IP >> connectivity in the link between the EAP peer and the EAP >> authenticator to run. This link MUST authorize exclusively >> unprotected IP traffic to be sent between the EAP peer and the EAP >> authenticator during the authentication with CoAP-EAP. >> >> Suggested: >> This link MUST only authorize >> unprotected IP traffic to be sent between the EAP peer and the EAP >> authenticator during the authentication with CoAP-EAP. >> > [Authors] We mean that this link will only allow unprotected traffic between > the EAP peer and the EAP for the purpose of running CoAP-EAP. Any other > traffic should not be allowed. > > The suggested text is ok. > > >> b) This sentence did not parse. We updated it to make a complete >> sentence. Please review this update carefully; if it is incorrect, >> please clarify. >> >> Original: >> It is worth noting that if the EAP authenticator is not >> in the same link as the EAP peer and an intermediate entity helps >> with this process (i.e., CoAP proxy) and the same comment applies to >> the communication between the EAP peer and the intermediary. >> >> Currently: >> It is worth noting that if the EAP authenticator is not >> in the same link as the EAP peer and an intermediate entity (i.e., a >> CoAP proxy) helps with this process, this concept also applies to the >> communication between the EAP peer and the intermediary. --> >> > [Authors] The suggested text is ok. > >> >> 33) <!-- [rfced] Section 8.5: Does "the document" refer to RFC 6677 or >> this document? Also, how may we update "(To be assigned by IANA)"? >> >> Original (the previous paragraph is included for context): >> According to the [RFC6677], channel binding, related to EAP, is sent >> through the EAP method supporting it. >> >> To satisfy the requirements of the document, the EAP lower layer >> identifier (To be assigned by IANA) needs to be sent, in the EAP >> Lower-Layer Attribute if RADIUS is used. >> >> Perhaps: >> To satisfy the requirements of this document, the EAP lower-layer >> identifier for CoAP-EAP (10) needs to be sent, in the EAP >> Lower-Layer Attribute if RADIUS is used. >> >> Or: >> To satisfy the requirements of this document, the EAP lower-layer >> identifier assigned by IANA (see Section 9.4) needs to be sent, in the EAP >> Lower-Layer Attribute if RADIUS is used. >> --> >> > > [Authors] We believe the first proposal is ok > To satisfy the requirements of this document, the EAP lower-layer > identifier for CoAP-EAP (10) needs to be sent, in the EAP > Lower-Layer Attribute if RADIUS is used. > > > >> >> 34) <!-- [rfced] Section 8.6: Does "Step 0" here refer to Step 0 in >> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest >> adding a citation for the appropriate figure. >> >> Original: >> For instance, an attacker can forge >> multiple initial messages to start an authentication (Step 0) with >> the EAP authenticator as if they were sent by different EAP peers. --> >> > [Authors] we refer to Figure 3. > > >> >> 35) <!-- [rfced] Sections 9.1 and 9.2: The name "CoAP-EAP protocol" for the >> new >> registry group reads oddly, as it means "Constrained Application >> Protocol-Extensible Authentication Protocol protocol". May we change the >> name of the new registry group to "CoAP-EAP"? >> >> If yes, we will ask IANA to update the registry group name on >> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/coap-eap.xhtml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6tPX02Xg$ >> >. >> (We could not find an existing IANA registry with the name "CoAP-EAP", >> so this name would be unique (but we would confirm this with IANA).) >> >> Original: >> IANA has created a new registry titled "CoAP-EAP Cipher Suites" under >> the new group name "CoAP-EAP protocol". >> ... >> IANA has created a new registry titled "CoAP-EAP Information element" >> under the new group name "CoAP-EAP protocol". --> >> > [Authors] The suggested changes are ok for us. > > >> >> 36) <!-- [rfced] Section 9.2: Because there is no "Value" entity in the >> "CoAP-EAP Information Elements" registry, we changed "Value" to >> "Label" per >> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ >> >. If this is >> incorrect, please clarify the list of columns in the "CoAP-EAP >> Information Elements" registry. >> >> Original: >> The columns of the registry are Name, Label, CBOR Type, Description >> and Reference, where Value is an integer, and the other columns are >> text strings. >> >> Currently: >> The columns of the registry are Name, Label, CBOR Type, Description, >> and Reference, where Label is an integer and the other columns are >> text strings. --> >> > [Authors] The proposed text is correct. > > >> >> 37) <!-- [rfced] [TS133.501]: We found a more recent version of this >> specification. Because it appears that EAP will continue to be >> mentioned in subsequent versions of this paper, may we update this >> listing as follows? >> >> Original: >> [TS133.501] >> ETSI, "5G; Security architecture and procedures for 5G >> System - TS 133 501 V15.2.0 (2018-10)", 2018. >> >> Suggested: >> [TS133.501] >> ETSI, "5G; Security architecture and procedures for 5G >> System - TS 133 501 V18.9.0", April 2025, >> https://urldefense.com/v3/__https://www.etsi.org/deliver/etsi_ts/133500_133599/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH47PGG_Jw$ >> >> 133501/18.09.00_60/ts_133501v180900p.pdf --> >> >> > > [Authors] The suggestion is ok and very welcome. Thank you. > > >> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number. >> We also found that >> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$ >> > steers to >> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >> >. When we searched >> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >> > for >> the number 095023r34, the result was "Nothing found, please try >> adjusting your search." >> >> Should a different paper be listed here and cited in Appendices B and >> C.5.1? >> >> Original: >> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document >> 095023r34)", 2014. --> >> >> > [Authors] Certainly, this seems to be an old reference. We have other > examples, the best course of action would be to remove this reference and the > associated text. > Forced removal can be done by sending new specific key material to the > devices that still belong to the network, excluding the removed device, > following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP > [ZigbeeIP]. > – > Another example would be when a shared Network Key is required by the devices > that join a network. An example of this Network Key can be found in Zigbee > IP [ZigbeeIP] or the THREAD protocol [THREAD]. > > > >> 39) <!-- [rfced] We found a newer version (1.4.0) of the Thread >> specification. As the citation in Appendix B is general in nature, >> may we update this listing as suggested below? >> >> Original: >> [THREAD] Thread Group, "Thread specification 1.3", 2023. >> >> Suggested: >> [THREAD] Kumar, S. and E. Dijk, "Thread 1.4 Features White Paper", >> September 2024, >> <https://urldefense.com/v3/__https://www.threadgroup.org/Portals/0/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7aZUQuhA$ >> >> Documents/ >> Thread_1.4_Features_White_Paper_September_2024.pdf>. --> >> >> > [Authors] The suggestion is ok and welcome. Thank you. > > >> 40) <!-- [rfced] Figure 9: >> >> a) Please note that we changed "hanshake" to "handshake". However, >> in the HTML and PDF output files, the space after the "e" in >> "hanshake" was removed in the process. We cannot determine where in >> the SVG a coordinate should be modified to correct the spacing. >> Please correct the SVG in the edited copy of the XML. >> >> b) We see "down" arrows between MSK and DTLS_PSK in the ASCII art >> for this figure, but they do not appear in the SVG. If you would >> like to add the arrows in the SVG, please correct the SVG in the >> edited copy of the XML. >> >> c) We see "(Protected with (D)TLS)" in the ASCII art but >> "Protected with (D)TLS" in the SVG. If you prefer the parentheses, >> please correct the SVG in the edited copy of the XML. If you prefer >> that the parentheses be removed, let us know, and we will update the >> ASCII art accordingly. --> >> > [Authors] New figure in rfc9820_modified.xml solves these issues. > Also, for consistency, in Figure 3 there were no arrows indicating key > derivation, we also updated that Figure in the xml file. > > >> >> 41) <!-- [rfced] Appendix A: >> >> a) As it appears that "Steps 1 and 2" here refer to Steps 1 and 2 in >> Figure 8 (as opposed to Steps 1 and 2 in Figure 3), may we add a >> citation for Figure 8 for ease of the reader? >> >> If the suggested text is not correct, please also clarify "if DTLS >> wants to be used". >> >> Original: >> To simplify the design in CoAP-EAP, the KDF hash algorithm >> can be included in the list of cipher suites exchanged in Step 1 and >> Step 2 if DTLS wants to be used instead of OSCORE. >> >> Suggested: >> To simplify the design in CoAP-EAP, the KDF hash algorithm >> can be included in the list of cipher suites exchanged in Steps 1 and >> 2 (Figure 8) if one wants to use DTLS instead of OSCORE. >> > [Authors] The suggested text is ok. > > >> b) Should "(RID-C) (RID-I)" be "RID-C || RID-I" per Appendix A.1? >> >> Original: >> For the same >> reason, the PSK identity is derived from (RID-C) (RID-I) as defined >> in Appendix A.1. --> >> > > [Authors] Yes, this is correct. "(RID-C) (RID-I)" should be "RID-C || RID-I" > > >> >> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this >> sentence, along the lines of "The other supported and negotiated >> cipher suites are the following" as seen in Section 6.1? >> >> Original: >> The hash algorithms considered are the following: >> >> * 5) TLS_SHA256 >> >> * 6) TLS_SHA384 >> >> * 7) TLS_SHA512 >> >> Possibly: >> The following hash algorithms are supported: >> >> * 5) TLS_SHA256 >> >> * 6) TLS_SHA384 >> >> * 7) TLS_SHA512 --> >> > [Authors] Following the previous issue (point 25) > Proposed text. > The following hash algorithms are considered in case the specification > includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) > > >> >> 43) <!-- [rfced] Appendix A.1: Because the other equations in this >> document don't end in periods, we removed the period from the end of >> this equation. Please let us know any concerns. >> >> Original: >> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length). >> >> Currently: >> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length) --> >> > [Authors] The current proposed correction is ok. > > >> >> 44) <!-- [rfced] Appendix B: Because "PSK" stands for "Pre-Shared Key", >> should "a shared key PSK" be "a PSK"? >> >> Original: >> Similarly, to the example of Appendix A.1, where a shared key PSK for >> DTLS is derived, it is possible to provide key material to different >> link-layers after the CoAP-EAP authentication is complete. --> >> > [Authors] You are correct. "a shared key PSK" should be "a PSK" > > >> >> 45) <!-- [rfced] Appendix B: This sentence was difficult to follow. >> We updated it as noted below. If this is incorrect, please clarify >> the text. >> >> Original: >> How a particular link-layer technology uses the MSK to derive further >> key material for protecting the link-layer or use the OSCORE >> protection to distribute key material is out of the scope of this >> document. >> >> Currently (changed "uses the MSK ... or use the OSCORE protection" to >> "uses the MSK ... or uses OSCORE protection"): >> How a particular link-layer technology uses the MSK to derive further >> key material for protecting the link layer or uses OSCORE protection >> to distribute key material is outside the scope of this document. --> >> > [Authors] The currently suggested text is ok. > > >> >> 46) <!-- [rfced] Appendix C: "EAP peers (A and B), which are EAP peers. >> They are the EAP peers." appeared to be some unintentionally repeated >> text. We removed the extra text as noted below. If some additional >> information for this bullet item was intended (for example, as was >> done for the "EAP authenticator (C)" and "AAA server (AAA)" bullet >> items), please provide the information. >> >> Original: >> * 2 EAP peers (A and B), which are EAP peers. They are the EAP >> peers. >> >> Currently: >> * Two EAP peers (A and B). --> >> > [Authors] The currently suggested text is ok. > > >> >> 47) <!-- [rfced] Appendix C: "the EAP authenticator acts as an EAP >> authenticator" read oddly and was difficult to follow. We updated >> this sentence as noted below. If this update is incorrect, please >> clarify the text. >> >> Original: >> Here, the EAP authenticator acts as an EAP authenticator in pass- >> through mode. >> >> Currently: >> Here, the EAP authenticator is operating in pass- >> through mode. --> >> > [Authors] The currently suggested text is ok. > > >> >> 48) <!-- [rfced] Appendix C: This sentence did not parse. We updated it >> as noted below. If this is incorrect, please clarify "... methods >> might need to be used (...) being able to ...". >> >> Original: >> With varied EAP peers and >> networks, more lightweight authentication methods might need to be >> used (e.g., EAP-NOOB[RFC9140], EAP-AKA'[RFC5448], EAP-PSK[RFC4764], >> EAP-EDHOC[I-D.ietf-emu-eap-edhoc], etc.) being able to adapt to >> different types of devices according to organization policies or >> devices capabilities. >> >> Currently: >> With varied EAP peers and >> networks, authentication methods that are more lightweight (e.g., >> EAP-NOOB [RFC9140], EAP-AKA' [RFC5448], EAP-PSK [RFC4764], EAP-EDHOC >> [EAP-EDHOC], etc.) and are able to adapt to different types of >> devices according to organization policies or device capabilities >> might need to be used. --> >> > [Authors] The currently suggested text is ok. > > > >> >> 49) <!-- [rfced] Appendix C.1: Does "while" in this sentence mean "at >> the same time as" or "as long as" (per the "as long as the key >> material is still valid" phrase in the "It is worth noting that the >> first phase ..." paragraph)? >> >> Original: >> This access can be repeated without contacting the EAP >> authenticator, while the credentials given to A are still valid. --> >> > [Authors] It means "as long as". > > >> >> 50) <!-- [rfced] Appendix C.1: We had trouble following the meaning of >> "the first phase with CoAP-EAP". If the suggested text is not >> correct, please provide clarifying text. >> >> Original: >> It is worth noting that the first phase with CoAP-EAP is required to >> join the EAP authenticator C's domain. >> >> Suggested: >> It is worth noting that to join EAP authenticator C's domain, the >> first phase (authentication via CoAP-EAP) is required. --> >> >> > [Authors] The currently suggested text is ok. > >> 51) <!-- [rfced] Appendix C.2: >> >> a) Should "AKA" be "AKA'", as used elsewhere in this document? >> >> Original: >> A device (A) of the domain acme.org, which uses a specific kind of >> credential (e.g., AKA) and intends to join the um.es domain. >> > [Authors] This clarification adds more confusion than without it. Please > leave it as follows > > A device (A) of the domain acme.org, which uses a specific kind of > credential (e.g., AKA) and intends to join the um.es domain. > >> b) This sentence does not parse. It appears that some words are >> missing. Please clarify "Through the local AAA server communicate >> with the home AAA server ...". >> >> Original: >> Through the local AAA server >> communicate with the home AAA server to complete the authentication >> and integrate the device as a trustworthy entity into the domain of >> EAP authenticator C. --> >> > [Authors]The text hopefully is clearer as follows: > Then, the local AAA server communicates with the home AAA server to complete > the authentication. This way, the device can be considered as a trustworthy > entity within the domain of the EAP authenticator C > > >> >> 52) <!-- [rfced] Appendix C.5.1: We corrected the incomplete >> "Where can ..." sentence as follows. If this change is not correct, >> please provide clarifying text. >> >> Original (the previous sentence is included for context): >> For >> example, in IEEE 802.15.4 networks, a new KMP ID can be defined to >> add such support in the case of IEEE 802.15.9 [ieee802159]. Where >> can be assumed that the device has at least a link-layer IPv6 >> address. >> >> Currently (now one sentence that includes the expansion for "KMP"): >> For >> example, in IEEE 802.15.4 networks, a new Key Management Protocol >> (KMP) ID can be defined to add such support in the case of IEEE >> 802.15.9 [IEEE802159], where it can be assumed that the device has at >> least a link-layer IPv6 address. --> >> > [Authors] The currently suggested text is ok. > > >> >> 53) <!-- [rfced] Appendix C.5.1: Per the phrase "entity (proxy) that is >> already part of the network (already shares key material and >> communicates through a secure channel with the authenticator)" in the >> next paragraph of this section and per Figure 10, we updated this >> sentence accordingly. If this is incorrect, please clarify what >> communicates through a secure channel. >> >> Original: >> In the case a proxy participates in CoAP- >> EAP, it will be because it is already a trustworthy entity within the >> domain, which communicates through a secure channel with the EAP >> authenticator, as illustrated by Figure 10. >> >> Currently: >> In the case that a proxy participates in >> CoAP-EAP, it will be because it is already a trustworthy entity >> within the domain and communicates through a secure channel with the >> EAP authenticator, as illustrated by Figure 10. --> >> > [Authors] The currently suggested text is ok. > > >> >> 54) <!-- [rfced] Appendix C.5.1: This paragraph had several issues: >> This section (Appendix C.5.1) cited itself, and in the second >> sentence, "As mentioned, either ..." was unclear. Also, the >> second sentence was incomplete. Please review all of our updates >> carefully, and let us know if anything is incorrect. >> >> (Side note: We cited Section 3.6 here because although Section 3.1 >> mentions both direct links and linking via a proxy, it doesn't >> provide any descriptive text.) >> >> Original: >> Thus, the EAP peer follows the same process described in >> Appendix C.5.1 to perform the authentication. As mentioned, either >> with a direct link to the EAP authenticator, or through an >> intermediary entity (proxy) that is already part of the network >> (already shares key material and communicates through a secure >> channel with the authenticator) and can aid in running CoAP-EAP. >> >> Currently (the direct connection is mentioned in the previous >> paragraph, so we did not mention it again here): >> If the EAP peer cannot connect to the EAP authenticator directly, >> the EAP peer can follow the same process as that described in >> Section 3.6 to perform the authentication (i.e., can connect via >> an intermediary entity (proxy) that is already part of the network >> (already shares key material and communicates through a secure >> channel with the authenticator) and can aid in running CoAP-EAP). --> >> > [Authors] The currently suggested text is ok. The only change would be to set > proxy as example. > … an intermediary entity (e.g., proxy) that is already part of the network > > >> >> 55) <!-- [rfced] Figure 10: We see "(security association)" in the ASCII >> art but "security association" in the SVG. If you prefer the >> parentheses, please correct the SVG in the edited copy of the XML. >> If you prefer that the parentheses be removed, let us know, and we >> will update the ASCII art accordingly. --> >> > [Authors] it is ok without parenthesis. > > >> >> 56) <!-- [rfced] Please review the "Inclusive Language" portion of >> the online Style Guide at >> <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7Wcxz1GQ$ >> >, >> and let us know if any changes are needed. Updates of this nature >> typically result in more precise language, which is helpful for >> readers. >> >> For example, please consider whether the following should be updated: >> Master Session Key, Master Secret, Master Salt, Master Key --> >> >> > [Authors] These are the same terms used in the EAP [RFC] standard and OSCORE > standard [RFC] from which this work depends. It is needed to understand the > terminology to which we refer. > >> 57) <!-- [rfced] Please let us know if any changes are needed for the >> following: >> >> a) The following terms were used inconsistently in this document. >> We chose to use the latter forms. Please let us know any objections. >> >> AAA Server / AAA server (per post-6000 published RFCs) >> > > [AUTHORS] AAA server >> Client registration (in running text) / >> client registration (per RFC 9200) >> > > [AUTHORS] client registration >> b) The following terms appear to be used inconsistently in this >> document. Please let us know which form is preferred. >> >> "a/eap/1" (the URI for the first resource would be "a/eap/1") / >> '/a/eap/1' >> > > [AUTHORS] "a/eap/1" >> CBOR Object / CBOR object > > [AUTHORS] CBOR Object >> >> DTLS PSK / DTLS_PSK > > [AUTHORS] DTLS_PSK >> >> EAP Failure / EAP failure >> (will send an EAP Failure, sends an EAP failure) >> > > [AUTHORS] EAP Failure >> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id >> > [AUTHORS] EAP-Request/Identity > >> EAP response / EAP Response (used generally in text, e.g., >> "an EAP response", "an EAP Response") >> (We also see "EAP Response header" in Section 7.1.) >> > [AUTHORS] EAP Response > > >> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id >> > [AUTHORS] EAP-Response/Identity > > >> EAP-X-Req (text) / EAP-X Req (Figure 3) >> > > [AUTHORS] EAP-X-Req > We updated the figures so they are consistent >> EAP-X-Resp (text) / EAP-X Resp (Figures 3 and 9) >> > [AUTHORS] EAP-X-Resp > > >> Network Key / network key >> > [AUTHORS] Network Key > > >> Option(s) / option(s) (e.g., "Location-Path Option", >> "Location-Path and/or Location-Query Options", >> "Location-Path or Location-Query options", >> "Location-Path (and/or Location-Query) Options", >> "Location-Path (and/or Location-Query) options") >> > [AUTHORS] Option(s) >> OSCORE Security Context / OSCORE security context >> > [AUTHORS] OSCORE Security Context > >> Session-Lifetime / Session-lifetime / Session Lifetime / >> session lifetime (in running text) >> (Figure 3 and Table 4 use "Session-Lifetime".) >> > [AUTHORS] Session-Lifetime > > >> c) Should quoting and spacing be made consistent? For example: >> >> Quoting: '2.01 Created' / "2.01 Created" > > [Authors] ‘2.01 Created’ >> >> Spacing: Payload(EAP-X Resp) / Payload (EAP-X Resp) > > [Authors] without spacing between be parenthesis >> >> d) Should spacing after step numbers in figures be made >> consistent? For example: >> >> ... >> 0)| No-Response | >> ... (Figure 3) >> >> ... >> 0) | No-Response | >> ... (Figure 5) --> >> >> > > [Authors] Without spacing is ok. > >> Thank you. >> >> RFC Editor/lb/rv >> > Thank you very much. > >> >> >> On Jul 18, 2025, at 10:46 AM, rfc-edi...@rfc-editor.org wrote: >> >> *****IMPORTANT***** >> >> Updated 2025/07/18 >> >> RFC Author(s): >> -------------- >> >> Instructions for Completing AUTH48 >> >> Your document has now entered AUTH48. Once it has been reviewed and >> approved by you and all coauthors, it will be published as an RFC. >> If an author is no longer available, there are several remedies >> available as listed in the FAQ >> (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4mckAP4A$ >> ). >> >> You and you coauthors are responsible for engaging other parties >> (e.g., Contributors or Working Group) as necessary before providing >> your approval. >> >> Planning your review >> --------------------- >> >> Please review the following aspects of your document: >> >> * RFC Editor questions >> >> Please review and resolve any questions raised by the RFC Editor >> that have been included in the XML file as comments marked as >> follows: >> >> <!-- [rfced] ... --> >> >> These questions will also be sent in a subsequent email. >> >> * Changes submitted by coauthors >> >> Please ensure that you review any changes submitted by your >> coauthors. We assume that if you do not speak up that you >> agree to changes submitted by your coauthors. >> >> * Content >> >> Please review the full content of the document, as this cannot >> change once the RFC is published. Please pay particular attention to: >> - IANA considerations updates (if applicable) >> - contact information >> - references >> >> * Copyright notices and legends >> >> Please review the copyright notice and legends as defined in >> RFC 5378 and the Trust Legal Provisions >> (TLP – >> https://urldefense.com/v3/__https://trustee.ietf.org/license-info__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5D1hB7LA$ >> ). >> >> * Semantic markup >> >> Please review the markup in the XML file to ensure that elements of >> content are correctly tagged. For example, ensure that <sourcecode> >> and <artwork> are set correctly. See details at >> <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4qmIsbLQ$ >> >. >> >> * Formatted output >> >> Please review the PDF, HTML, and TXT files to ensure that the >> formatted output, as generated from the markup in the XML file, is >> reasonable. Please note that the TXT will have formatting >> limitations compared to the PDF and HTML. >> >> >> Submitting changes >> ------------------ >> >> To submit changes, please reply to this email using ‘REPLY ALL’ as all >> the parties CCed on this message need to see your changes. The parties >> include: >> >> * your coauthors >> >> * rfc-edi...@rfc-editor.org (the RPC team) >> >> * other document participants, depending on the stream (e.g., >> IETF Stream participants are your working group chairs, the >> responsible ADs, and the document shepherd). >> >> * auth48archive@rfc-editor.org, which is a new archival mailing list >> to preserve AUTH48 conversations; it is not an active discussion >> list: >> >> * More info: >> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH73FBctPw$ >> >> >> * The archive itself: >> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5RDfiTDg$ >> >> >> * Note: If only absolutely necessary, you may temporarily opt out >> of the archiving of messages (e.g., to discuss a sensitive matter). >> If needed, please add a note at the top of the message that you >> have dropped the address. When the discussion is concluded, >> auth48archive@rfc-editor.org will be re-added to the CC list and >> its addition will be noted at the top of the message. >> >> You may submit your changes in one of two ways: >> >> An update to the provided XML file >> — OR — >> An explicit list of changes in this format >> >> Section # (or indicate Global) >> >> OLD: >> old text >> >> NEW: >> new text >> >> You do not need to reply with both an updated XML file and an explicit >> list of changes, as either form is sufficient. >> >> We will ask a stream manager to review and approve any changes that seem >> beyond editorial in nature, e.g., addition of new text, deletion of text, >> and technical changes. Information about stream managers can be found in >> the FAQ. Editorial changes do not require approval from a stream manager. >> >> >> Approving for publication >> -------------------------- >> >> To approve your RFC for publication, please reply to this email stating >> that you approve this RFC for publication. Please use ‘REPLY ALL’, >> as all the parties CCed on this message need to see your approval. >> >> >> Files >> ----- >> >> The files are available here: >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH61uj9KFA$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH46vzPMGQ$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4VnhbREw$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7CGA_kaw$ >> >> >> Diff file of the text: >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6IAS29qA$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6sl8fsTg$ >> (side by side) >> >> Diff of the XML: >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6VqyXnzw$ >> >> >> >> Tracking progress >> ----------------- >> >> The details of the AUTH48 status of your document are here: >> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9820__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH41wCjt6w$ >> >> >> Please let us know if you have any questions. >> >> Thank you for your cooperation, >> >> RFC Editor >> >> -------------------------------------- >> RFC9820 (draft-ietf-ace-wg-coap-eap-15) >> >> Title : EAP-based Authentication Service for CoAP >> Author(s) : R. Marin-Lopez, D. Garcia-Carrillo >> WG Chair(s) : Loganaden Velvindron, Tim Hollebeek >> >> Area Director(s) : Deb Cooley, Paul Wouters >> >> >> > -- > Dan García Carrillo > --------------------- > Associate Professor > Dpto. de Informática, Área de Telemática, Universidad de Oviedo > Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón > Dpcho. 2.7.8 - Edificio Polivalente > Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es > <rfc9820_modified.xml> -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org