Dear RFC Editor, Great news. Thank you very much for the update.
Best regards, Dan. Enviado desde mi iPhone > El 31 jul 2025, a las 21:46, Lynne Bartholomew > <lbartholo...@staff.rfc-editor.org> escribió: > > [You don't often get email from lbartholo...@staff.rfc-editor.org. Learn why > this is important at https://aka.ms/LearnAboutSenderIdentification ] > > Dear Dan and Rafa, > > Just checking in to let you know that we are working through your replies > below and are most of the way through them. We plan to send you an email on > 4 August, with links to the latest files for your review. > > Thank you for your patience! > > RFC Editor/lb > > >> On Jul 29, 2025, at 10:09 AM, Dan Garcia Carrillo <garcia...@uniovi.es> >> wrote: >> >> Dear RFC Editor, >> Please see answers inline. For the requested clarifications in Figures, we >> attach a .xml version with the figures updated. >> Please, let us know if anything else is required. >> >>> El 18/7/25 a las 19:53, rfc-edi...@rfc-editor.org escribió: >>> Authors and AD*, >>> >>> *AD, please see question #1 below. >>> >>> Authors, while reviewing this document during AUTH48, please resolve (as >>> necessary) the following questions, which are also in the XML file. >>> >>> >>> 1) <!-- [rfced] *AD, text was added to the Acknowledgements section after >>> the >>> document was approved for publication. Please review the changes and >>> let us know if you approve. >>> >>> Diff between v14 and v15: >>> https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH77QRYqZw$ >>> --> >>> >>> >>> 2) <!-- [rfced] Please note that the title of the document has been updated >>> as >>> follows. We expanded abbreviations per Section 3.6 of RFC 7322 ("RFC >>> Style Guide"), recast "-based" to avoid using a hyphen with an expansion, >>> and added "for Use with". Please review. >>> >>> Original: >>> EAP-Based Authentication Service for CoAP >>> >>> Current: >>> Authentication Service Based on the Extensible Authentication Protocol >>> (EAP) for Use with the Constrained >>> Application Protocol (CoAP) >>> --> >>> >> [Authors] This change is ok. >>> >>> >>> 3) <!-- [rfced] Please insert any keywords (beyond those that appear in the >>> title) for use on >>> <https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7N7e55Gg$ >>> >. --> >>> >> [Authors] We believe that these could be keywords representing the work: >> >> CoAP, EAP, EAP lower layer, Internet of Things, IoT, Constrained Node, Smart >> Object >> >>> >>> 4) <!-- [rfced] Abstract: We had trouble following the meaning of >>> "transported" in this sentence. If the suggested text is not >>> correct, please provide clarifying text. >>> >>> Original: >>> This document specifies an authentication service that uses the >>> Extensible Authentication Protocol (EAP) transported employing >>> Constrained Application Protocol (CoAP) messages. >>> >>> Suggested: >>> This document specifies an authentication service that uses the >>> Extensible Authentication Protocol (EAP) as a transport method that >>> employs Constrained Application Protocol (CoAP) messages. --> >>> >> [Authors] The suggested text can be misleading as the protocol being carried >> is EAP and the one that carries EAP is CoAP. >> Next, our suggested text would be: >> This document specifies an authentication service that uses the >> Constrained Application Protocol (CoAP) as a transport method to >> carry the Extensible Authentication Protocol (EAP). >> >> >>> >>> 5) <!-- [rfced] We found quite a few undefined abbreviations in this >>> document. For ease of the reader, we expanded as many of them as we >>> could find. Most were straightforward (e.g., SAML per RFC 7833, >>> PANA per RFC 5191), but please confirm that our expansions for MIC >>> (currently "Message Integrity Check") and LoRa (currently "Long >>> Range") are correct. >>> >>> Original: >>> EAP relies on lower layer error >>> detection (e.g., CRC, checksum, MIC, etc.). >>> ... >>> Given that EAP is also used for network access authentication, this >>> service can be adapted to other technologies. For instance, to >>> provide network access control to very constrained technologies >>> (e.g., LoRa network). >>> >>> Currently (fixed the incomplete sentence in the "LoRa" text): >>> EAP relies on lower-layer error >>> detection (e.g., CRC, checksum, Message Integrity Check (MIC), >>> etc.). >>> ... >>> Given that EAP is also used for network access authentication, this >>> service can be adapted to other technologies - for instance, to >>> provide network access control to very constrained technologies >>> (e.g., Long Range (LoRa) networks). --> >>> >> [Authors] Yes, these suggestions are correct. >> >>> >>> 6) <!-- [rfced] Section 2: These sentences did not parse. We updated >>> the text. If this is incorrect, please provide clarifying text. >>> >>> Original: >>> The rationale behind this decision >>> is that EAP requests direction is always from the EAP server to the >>> EAP peer. Accordingly, EAP responses direction is always from the >>> EAP peer to the EAP server. >>> >>> Currently: >>> The rationale behind this decision is that EAP requests will always >>> travel from the EAP server to the EAP peer. Accordingly, EAP >>> responses will always travel from the EAP peer to the EAP server. --> >>> >>> >> [Authors] Yes, these suggestions are correct. >> >> >>> 7) <!-- [rfced] Please review each artwork element. Should any artwork >>> element be tagged as sourcecode? If the current list of preferred >>> values for "type" on >>> <https://urldefense.com/v3/__https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5spEm40g$ >>> > >>> does not contain an applicable type, please let us know. Also, it is >>> acceptable to leave the "type" attribute unset. --> >>> >> [Authors] We assume that this is in reference to "Figure 6: CBOR Data >> Structure for CoAP-EAP". >> It is not our intention to specify sourcecode, it could be left as type >> unset. >> >>> >>> 8) <!-- [rfced] Figure 1: We see "(SCOPE OF THIS DOCUMENT)" in the >>> ASCII art but "SCOPE OF THIS DOCUMENT" in the SVG. If you prefer the >>> parentheses, please correct the SVG in the edited copy of the XML. >>> If you prefer that the parentheses be removed, let us know, and we >>> will update the ASCII art accordingly. --> >>> >>> >> [Authors] There are no need for parentheses, the message is clear without >> them. >> >>> 9) <!-- [rfced] Figure 2: We changed "Request/Responses/Signaling" to >>> "Request / Responses / Signaling", to match the spacing style of the >>> other entries in the figure. However, the "Request / Responses / >>> Signaling" line now looks a bit crowded in the SVG renderings in the >>> HTML and PDF output files. We cannot determine where in the SVG a >>> coordinate should be modified to correct the spacing. Please correct >>> the SVG in the edited copy of the XML. --> >>> >> [Authors] The line should say >> Requests / Responses / Signaling >> >> We have provided a new <artwork> code in the attached document >> rfc9820_modified.xml that is not so crowded and tries to convey the >> improvements. >> This is also updated in svg in the attached file rfc9820_modified.xml >> >>> >>> 10) <!-- [rfced] Sections 3.1 and subsequent: We see phrases such as >>> "an intermediary proxy", "intermediary (i.e., proxy)", and >>> "intermediaries such as proxies" in this document. Will the >>> distinction regarding whether or not intermediaries are sometimes or >>> always proxies be clear to readers? --> >>> >> [Authors] We are following CoAP terminology, being according to rfc7252 >> Intermediary >> A CoAP endpoint that acts both as a server and as a client towards an >> origin server (possibly via further intermediaries). A common form of an >> intermediary is a proxy; several classes of such proxies are discussed in >> this specification. >> Maybe the following modifications would make this clearer to the reader. >> 3.1. Discovery >> Before the CoAP-EAP exchange takes place, the EAP peer needs to discover >> the EAP authenticator or the entity that will enable the CoAP-EAP exchange >> (e.g.i.e., an intermediary proxy). >> —- >> 8.3. Allowing CoAP-EAP Traffic to Perform Authentication >> Since CoAP is an application protocol, CoAP-EAP assumes certain IP >> connectivity in the link between the EAP peer and the EAP authenticator to >> run. This link MUST authorize exclusively unprotected IP traffic to be >> sent between the EAP peer and the EAP authenticator during the >> authentication with CoAP-EAP. Once the authentication is successful, the >> key material generated by the EAP authentication (MSK) and any other traffic >> can be authorized if it is protected. It is worth noting that if the EAP >> authenticator is not in the same link as the EAP peer and an intermediate >> entity (i.e.e.g., a CoAP proxy) helps with this process, this concept also >> applies to the communication between the EAP peer and the intermediary. >> —- >> When the EAP peer intends to be admitted into the network, it would search >> for an entity that offers the CoAP-EAP service, be it directly via the EAP >> authenticator or through an intermediary (i.e.e.g., proxy). See Section 3.1. >> — >> If the EAP peer cannot connect to the EAP authenticator directly, the EAP >> peer can follow the same process as that described in Section 3.6 to perform >> the authentication (i.e., can connect via an intermediary entity (e.g., >> proxy) that is already part of the network (already shares key material and >> communicates through a secure channel with the authenticator) and can aid in >> running CoAP-EAP). >> — >> When CoAP-EAP is completed and the OSCORE security association is >> established with the EAP authenticator, the EAP peer receives the local >> configuration parameters for the network (e.g., a network key) and can >> configure a global IPv6 address. Moreover, there is no need for a CoAP >> proxy an intermediary entity after a successful authentication. >> >>> >>> 11) <!-- [rfced] Section 3.1: This sentence does not parse. If neither >>> suggestion below is correct, please clarify the meaning of "hence". >>> >>> Original: >>> For >>> example, on a 6LoWPAN network, the Border Router will typically act >>> as the EAP authenticator hence, after receiving the Router >>> Advertisement (RA) messages from the Border Router, the EAP peer may >>> engage on the CoAP-EAP exchange. >>> >>> Suggestion #1: >>> For >>> example, in a 6LoWPAN network, the Border Router will henceforth >>> typically act as the EAP authenticator. After receiving the Router >>> Advertisement (RA) messages from the Border Router, the EAP peer may >>> engage in the CoAP-EAP exchange. >>> >>> Suggestion #2: >>> For >>> example, in a 6LoWPAN network, the Border Router will typically act >>> as the EAP authenticator. Hence, after receiving the Router >>> Advertisement (RA) messages from the Border Router, the EAP peer may >>> engage in the CoAP-EAP exchange. --> >>> >> [Authors] Suggestion #2 >> >>> >>> 12) <!-- [rfced] Section 3.2: Please confirm that the "Implementation >>> notes" paragraph and bullet list should remain independent of Step 0 >>> (i.e., should not be indented so that it is part of Step 0). We see >>> "resource of a step of the authentication" in the text, which seems >>> to indicate that this information applies to all steps and not just >>> Step 0, but we would still like you to confirm that the current >>> indentation levels are correct. >>> >>> Original: >>> * Step 0. The EAP peer MUST start the CoAP-EAP process by sending a >>> "POST /.well-known/coap-eap" request (trigger message). This >>> message carries the 'No-Response' [RFC7967] CoAP option to avoid >>> waiting for a response that is not needed. This is the only >>> message where the EAP authenticator acts as a CoAP server and the >>> EAP peer as a CoAP client. The message also includes a URI in the >>> payload of the message to indicate the resource where the EAP >>> authenticator MUST send the next message. The name of the >>> resource is selected by the CoAP server. >>> >>> Implementation notes: When generating the URI for a resource of a >>> step of the authentication, the resource could have the following >>> format as an example "path/eap/counter", where: >>> >>> * "path" is some local path on the device to make the path unique. >>> This could be omitted if desired. >>> >>> * "eap" is the name that indicates the URI is for the EAP peer. >>> This has no meaning for the protocol but helps with debugging. >>> >>> * "counter' which is an incrementing unique number for every new EAP >>> request. >>> >>> So, in Figure 3 for example, the URI for the first resource would be >>> “a/eap/1" >>> >>> * Step 1. ... --> >>> >> [Authors] Yes, the "Implementation notes" paragraph and bullet list should >> remain independent of Step 0 >> >>> >>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the >>> EAP peer or the EAP peer state machine? If the suggested text is not >>> correct, please provide clarifying text. >>> >>> Original (previous text is included for context): >>> * Step 2. The EAP peer processes the POST message sending the EAP >>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>> an EAP response (EAP Resp/Id). Then, assigns a new resource to >>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes >>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created' >>> response with the new resource identifier in the Location-Path >>> (and/or Location-Query) options for the next step. >>> >>> Suggested (guessing the EAP peer state machine): >>> * Step 2. The EAP peer processes the POST message, sending the EAP >>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine >>> assigns a new resource to the ongoing authentication process >>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1'). >>> Finally, the EAP peer state machine sends a '2.01 Created' >>> response with the new resource identifier in the Location-Path >>> (and/or Location-Query) options for the next step. --> >>> >> [Authors] We believe the best way to specify this is to differentiate >> between "EAP peer state machine" and the CoAP-EAP application of the EAP >> peer. >> The EAP peer state machine only deals with EAP messages. Processes EAP >> requests and returns an EAP response. >> With that, the CoAP-EAP application within the EAP peer takes control and >> manages everything CoAP related. Assigns a new resource to the ongoing >> authentication process (e.g., '/a/eap/2') and deletes the previous one >> ('/a/eap/1') >> So, a suggested new text. >> Step 2. The EAP peer processes the POST message sending the EAP >> request (EAP-Req/Id) to the EAP peer state machine, which returns >> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application >> assigns a new resource to the ongoing authentication process >> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1'). >> Finally, sends a '2.01 Created'response with the new resource >> identifier in the Location-Path (and/or Location-Query) options >> for the next step. >> >> >>> >>> 14) <!-- [rfced] Section 3.2: Please clarify the meaning of "response to >>> carry the EAP response" in this sentence. >>> >>> Original: >>> The EAP peer will use a response to carry the EAP response in the >>> payload. --> >>> >> [Authors] The text should say: >> The EAP peer will use a CoAP response to carry the EAP response in the >> payload. >> >>> >>> 15) <!-- [rfced] Section 3.5: The second sentence was incomplete and >>> difficult to follow. Per Sections 3.5.1 through 3.5.3, we updated >>> this section as noted below. If this is incorrect, please clarify. >>> >>> Original: >>> This section elaborates on how different errors are handled. From >>> EAP authentication failure, a non-responsive endpoint lost messages, >>> or an initial POST message arriving out of place. >>> >>> Currently: >>> This section elaborates on how different errors are handled: EAP >>> authentication failure (Section 3.5.1), a non-responsive endpoint >>> (Section 3.5.2), and duplicated messages (Section 3.5.3). --> >>> >> [Authors] The suggested text is ok. >> >> >>> >>> 16) <!-- [rfced] Section 3.5.2: We could not follow the meaning of this >>> run-on sentence. If the suggested text is not correct, please >>> provide clarifying text. >>> >>> Original: >>> By default, CoAP-EAP adopts the >>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and >>> Authenticator to remove the CoAP-EAP state if the authentication >>> process has not progressed in that time, in consequence, it has not >>> been completed. >>> >>> Suggested: >>> By default, CoAP-EAP adopts the >>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and >>> authenticator to remove the CoAP-EAP state if the authentication >>> process has not progressed to completion during that time. --> >>> >> [Authors] The suggested text is ok. >> >>> >>> 17) <!-- [rfced] Section 3.5.3: Does "Step 0" here refer to Step 0 in >>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest >>> adding a citation for the appropriate figure. >>> >>> Original: >>> The reception of the trigger message in Step 0 containing the URI >>> /coap-eap needs some additional considerations, as the resource is >>> always available in the EAP authenticator. --> >>> >> [Authors] This first instance of Step 0 is referring to the complete Flow in >> Figure 3. >> The last instance refers to Figure 5. >> For clarity the text would be: >> The reception of the trigger message (Step 0 in Figure 3) containing the URI >> /coap-eap needs some additional considerations, as the resource is always >> available in the EAP authenticator. >> If a trigger message arrives at the EAP authenticator during an ongoing >> authentication with the same EAP peer, the EAP authenticator MUST silently >> discard this trigger message. >> If an old "POST /.well-known/coap-eap" (Step 0 in Figure 5) arrives at the >> EAP authenticator and there is no authentication ongoing, the EAP >> authenticator may understand that a new authentication process is requested. >> Consequently, the EAP authenticator will start a new EAP authentication. >> However, if the EAP peer did not start any authentication and therefore, it >> did not select any resource for the EAP authentication. Thus, the EAP peer >> sends a '4.04 Not Found' in the response. >> >>> >>> 18) <!-- [rfced] Section 3.5.3: The "However, if ..." sentence is >>> incomplete; it appears that some words are missing. Please clarify >>> this text. >>> >>> Original (the previous and next sentences are included for context): >>> Consequently, the EAP authenticator will start a new EAP >>> authentication. However, if the EAP peer did not start any >>> authentication and therefore, it did not select any resource for the >>> EAP authentication. Thus, the EAP peer sends a '4.04 Not found' in >>> the response (Figure 5). --> >>> >> [Authors] Maybe this is simpler, >> “However, if the EAP peer did not start any authentication, it will send a >> '4.04 Not found' in the response (Figure 5).” >>> >>> 19) <!-- [rfced] Section 3.6: The following sentences do not parse. >>> >>> If the suggested text for the first sentence is not correct, please >>> provide clarifying text. >>> >>> We cannot follow the meaning of the second sentence. Please clarify >>> "the proxy will act as forward, and as reverse for the rest". >>> >>> Original (the first sentence is included for context): >>> After that, in the >>> remaining exchanges the roles are reversed, being the EAP peer, the >>> CoAP server, and the EAP authenticator, the CoAP client. When using >>> a proxy in the exchange, for message 0, the proxy will act as >>> forward, and as reverse for the rest. >>> >>> Suggested (first sentence): >>> In the remaining exchanges, the roles are reversed (i.e., the EAP >>> peer acts as the CoAP server, and the EAP authenticator acts as the >>> CoAP client). --> >>> >> [Authors] The text would be the following, hopefully it is clearer: >> In the remaining exchanges, the roles are reversed (i.e., the EAP >> peer acts as the CoAP server, and the EAP authenticator acts as the >> CoAP client). When using a proxy in the exchange, for message 0 it will act >> as a forward proxy, and as a reverse proxy for the rest. >>> >>> 20) <!-- [rfced] Section 5: We found this sentence confusing, because >>> the plural "Examples" is used but the text that follows shows an >>> "either-or" relationship ("cipher suites that need to be negotiated >>> or ..."). If the suggested text is not correct, please provide >>> clarifying text. >>> >>> Original (the previous sentence is included for context): >>> In the CoAP-EAP exchange, there is information that needs to be >>> exchanged between the two entities. Examples of this information are >>> the cipher suites that need to be negotiated or authorization >>> information (Session-lifetime). >>> >>> Suggested: >>> In the CoAP-EAP exchange, information needs to be exchanged between >>> the two entities - for example, the cipher suites that need to be >>> negotiated, or authorization information (Session-lifetime). --> >>> >> [Authors] The suggested text is ok. >> >> >>> >>> 21) <!-- [rfced] Section 5: Per Figure 6, Table 4, and >>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ >>> >, we moved the RID-I item >>> so that it is the third item (Label 3, per Figure 6, Table 4, and >>> IANA) instead of the second; RID-C is now the second item. >>> Please let us know any objections. >>> >>> Original: >>> 2. RID-I: Is the Recipient ID of the EAP peer. The EAP >>> authenticator uses this value as a Sender ID for its OSCORE >>> Sender Context. The EAP peer uses this value as Recipient ID for >>> its Recipient Context. >>> >>> 3. RID-C: Is the Recipient ID of the EAP authenticator. The EAP >>> peer uses this value as a Sender ID for its OSCORE Sender >>> Context. The EAP authenticator uses this value as Recipient ID >>> for its Recipient Context. >>> >>> Currently: >>> 2. RID-C: The Recipient ID of the EAP authenticator. The EAP peer >>> uses this value as the Sender ID for its OSCORE Sender Context. >>> The EAP authenticator uses this value as the Recipient ID for its >>> Recipient Context. >>> >>> 3. RID-I: The Recipient ID of the EAP peer. The EAP authenticator >>> uses this value as the Sender ID for its OSCORE Sender Context. >>> The EAP peer uses this value as the Recipient ID for its >>> Recipient Context. --> >>> >> [Authors] No objection. >> >> >>> >>> 22) <!-- [rfced] Section 6.1: Does "Steps 1 and 2" here refer to >>> Steps 1 and 2 in Figure 3 or Steps 1 and 2 in Figure 8? >>> For ease of the reader, we suggest adding a citation for the >>> appropriate figure. >>> >>> Original: >>> OSCORE runs after the EAP authentication, using the cipher suite >>> selected in the cipher suite negotiation (Steps 1 and 2). --> >>> >> [Authors] We refer to Figure 3 in the first instance. To Figure 8 in the >> other instances in that section. Corrected text below: >> OSCORE runs after the EAP authentication, using the cipher suite selected in >> the cipher suite negotiation (Steps 1 and 2 in Figure 3). To negotiate the >> cipher suite, CoAP-EAP follows a simple approach: The EAP authenticator >> sends a list, in decreasing order of preference, with the identifiers of the >> supported cipher suites (Step 1 in Figure 8). In the response to that >> message (Step 2 in Figure 8), the EAP peer sends its choice. >> >> >>> >>> 23) <!-- [rfced] Section 6.1: We had trouble following this sentence. >>> If the suggested text is not correct, please clarify "where it can be >>> appreciated the disposition". >>> >>> Original: >>> An example of the exchange with the >>> cipher suite negotiation is shown in Figure 8, where it can be >>> appreciated the disposition of both EAP-Request/Identity and EAP- >>> Response/Identity, followed by the CBOR object defined in Section 5, >>> containing the cipher suite field for the cipher suite negotiation. >>> >>> Suggested: >>> An example exchange for the >>> cipher suite negotiation is shown in Figure 8. The >>> EAP request (EAP-Request/Identity) and EAP response >>> (EAP-Response/Identity) are sent; both messages include the CBOR >>> object (Section 5) containing the cipher suite field for the cipher >>> suite negotiation. --> >>> >> [Authors] The suggested text is ok >> >> >> >>> >>> 24) <!-- [rfced] Figure 7: We note that the ASCII art has two pipes (with >>> "+" >>> above each) between the "Data" and "cipher suites" fields, while the SVG >>> has vertical lines along with curved lines that intersect each >>> other. Please review and correct the edited copy of the XML if needed. >>> --> >>> >> [Authors] We provided a new Figure in the xml attached file that hopefully >> is much more clearer. >> >>> >>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need >>> to be numbered? If yes, will this numbering scheme be clear to >>> readers? >>> >>> Original: >>> * 0) AES-CCM-16-64-128, SHA-256 (default) >>> >>> * 1) A128GCM, SHA-256 >>> >>> * 2) A256GCM, SHA-384 >>> >>> * 3) ChaCha20/Poly1305, SHA-256 >>> >>> * 4) ChaCha20/Poly1305, SHAKE256 >>> ... >>> * 5) TLS_SHA256 >>> >>> * 6) TLS_SHA384 >>> >>> * 7) TLS_SHA512 >>> >>> Perhaps: >>> * AES-CCM-16-64-128, SHA-256 (default) >>> >>> * A128GCM, SHA-256 >>> >>> * A256GCM, SHA-384 >>> >>> * ChaCha20/Poly1305, SHA-256 >>> >>> * ChaCha20/Poly1305, SHAKE256 >>> ... >>> * TLS_SHA256 >>> >>> * TLS_SHA384 >>> >>> * TLS_SHA512 >>> >>> --> >>> >> [Authors] The numbers on Sections 6.1 match the values in “9.1. CoAP-EAP >> Cipher Suites”. >> The numbers in Appendix A are the expected continuation of these, but are >> not in the specification, and not in the IANA section. This text should also >> solve issue 42 as well. >> Suggested update text: >> The following hash algorithms are considered in case the specification >> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) >> >>> >>> 26) <!-- [rfced] Section 6.2: Does "Steps 7 and 8" here refer to >>> Steps 7 and 8 in Figure 3? If yes, for ease of the reader we suggest >>> adding a citation for Figure 3. >>> >>> Original: >>> The derivation of the security context for OSCORE allows securing the >>> communication between the EAP peer and the EAP authenticator once the >>> MSK has been exported, providing confidentiality, integrity, key >>> confirmation (Steps 7 and 8), and downgrading attack detection. --> >>> >> [Authors] Yes, we refer to Figure 3. >> >>> >>> 27) <!-- [rfced] Section 6.2: We clarified these sentences as noted >>> below. If these updates are incorrect, please clarify "the cipher >>> suite 0". >>> >>> Original: >>> If CS-C or CS-I were not sent, (i.e., default algorithms are used) >>> the value used to generate CS will be the same as if the default >>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR >>> array with the cipher suite 0). >>> ... >>> If CS-C or CS-I were not sent, (i.e., default algorithms are used) >>> the value used to generate CS will be the same as if the default >>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR >>> array with the cipher suite 0). >>> >>> Currently: >>> If neither CS-C nor CS-I was sent (i.e., default algorithms are >>> used), the value used to generate CS will be the same as if the >>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a >>> CBOR array with the cipher suite value of 0). >>> ... >>> If neither CS-C nor CS-I was sent (i.e., default algorithms are >>> used), the value used to generate CS will be the same as if the >>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a >>> CBOR array with the cipher suite value of 0). --> >>> >> [Authors] The suggested text is ok. >> >> >>> >>> 28) <!-- [rfced] Please review instances of the term "NULL" as used in this >>> document and let us know if any updates are needed. We believe that >>> "NULL" should be updated to either "NUL" (that is, referring to the >>> specific ASCII control code) or "null". --> >>> >> [Authors] We mean the same as the instance you can find in rfc5191 of PANA >> page 16 >> - "IETF PANA" is the ASCII code representation of the non-NULL terminated >> string (excluding the double quotes around it). >> >> >>> >>> 29) <!-- [rfced] Section 7.1: We changed this text as noted below. >>> Please review carefully (including our expansion of "AVP" for ease of >>> the reader), and let us know if anything is incorrect. >>> >>> Original: >>> Note: When EAP >>> is proxied over an AAA framework, the Access-Request packets in >>> RADIUS MUST contain a Framed-MTU attribute with the value 1024, and >>> the Framed-MTU AVP to 1024 in DIAMETER This attribute signals the AAA >>> server that it should limit its responses to 1024 octets. >>> >>> Currently: >>> Note: When EAP is proxied over a AAA framework, the >>> Access-Request packets in RADIUS MUST contain a Framed-MTU >>> attribute with a value of 1024 and, in Diameter, the Framed-MTU >>> Attribute-Value Pair (AVP) with a value of 1024. This information >>> signals the AAA server that it should limit its responses to 1024 >>> octets. --> >>> >> [Authors] The suggested text is ok. >> >> >>> >>> 30) <!-- [rfced] Section 7.2: This sentence is difficult to parse. If >>> the suggested text is not correct, please rephrase "constrained >>> devices and network scenarios" and "older versions with the goal of >>> economization". >>> >>> Also, please review and let us know whether this "Note:" item that is >>> set off in a separate paragraph should be in the <aside> element. >>> <aside> is defined as "a container for content that is semantically >>> less important or tangential to the content that surrounds it" >>> (https://urldefense.com/v3/__https://authors.ietf.org/en/rfcxml-vocabulary*aside__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5DOBldVg$ >>> ). >>> >>> Original: >>> Note: For constrained devices and network scenarios, the use of the >>> latest versions of EAP methods (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 >>> [RFC9190]) is recommended in favor of older versions with the goal of >>> economization, or EAP methods more adapted for IoT (e.g., EAP-NOOB >>> [RFC9140], EAP-EDHOC [I-D.ietf-emu-eap-edhoc], etc.). >>> >>> Suggested: >>> Note: To improve efficiency in environments with >>> constrained devices and networks, the latest versions of EAP methods >>> (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 [RFC9190]) are recommended over >>> older versions. EAP methods more adapted for IoT networks (e.g., >>> EAP-NOOB [RFC9140], EAP-EDHOC [EAP-EDHOC], etc.) are also >>> recommended. --> >>> >> [Authors] The suggested text is ok. >> >> >>> >>> 31) <!-- [rfced] Section 8.2: This sentence did not parse. We updated >>> it as noted below. If this update is incorrect, please clarify >>> "can be with the transport of SAML". >>> >>> Original: >>> Providing more fine-grained >>> authorization data can be with the transport of SAML in RADIUS >>> [RFC7833]. >>> >>> Currently: >>> Providing more fine-grained >>> authorization data can be done by transporting the data using the >>> Security Assertion Markup Language (SAML) in RADIUS [RFC7833]. --> >>> >> [Authors] Currently suggested text is ok. >>> >>> >>> 32) <!-- [rfced] Section 8.3: >>> >>> a) To what does "exclusively" refer in this sentence? If the >>> suggested text is not correct, please clarify. >>> >>> Original (the previous sentence is included for context): >>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP >>> connectivity in the link between the EAP peer and the EAP >>> authenticator to run. This link MUST authorize exclusively >>> unprotected IP traffic to be sent between the EAP peer and the EAP >>> authenticator during the authentication with CoAP-EAP. >>> >>> Suggested: >>> This link MUST only authorize >>> unprotected IP traffic to be sent between the EAP peer and the EAP >>> authenticator during the authentication with CoAP-EAP. >>> >> [Authors] We mean that this link will only allow unprotected traffic between >> the EAP peer and the EAP for the purpose of running CoAP-EAP. Any other >> traffic should not be allowed. >> >> The suggested text is ok. >> >> >>> b) This sentence did not parse. We updated it to make a complete >>> sentence. Please review this update carefully; if it is incorrect, >>> please clarify. >>> >>> Original: >>> It is worth noting that if the EAP authenticator is not >>> in the same link as the EAP peer and an intermediate entity helps >>> with this process (i.e., CoAP proxy) and the same comment applies to >>> the communication between the EAP peer and the intermediary. >>> >>> Currently: >>> It is worth noting that if the EAP authenticator is not >>> in the same link as the EAP peer and an intermediate entity (i.e., a >>> CoAP proxy) helps with this process, this concept also applies to the >>> communication between the EAP peer and the intermediary. --> >>> >> [Authors] The suggested text is ok. >> >>> >>> 33) <!-- [rfced] Section 8.5: Does "the document" refer to RFC 6677 or >>> this document? Also, how may we update "(To be assigned by IANA)"? >>> >>> Original (the previous paragraph is included for context): >>> According to the [RFC6677], channel binding, related to EAP, is sent >>> through the EAP method supporting it. >>> >>> To satisfy the requirements of the document, the EAP lower layer >>> identifier (To be assigned by IANA) needs to be sent, in the EAP >>> Lower-Layer Attribute if RADIUS is used. >>> >>> Perhaps: >>> To satisfy the requirements of this document, the EAP lower-layer >>> identifier for CoAP-EAP (10) needs to be sent, in the EAP >>> Lower-Layer Attribute if RADIUS is used. >>> >>> Or: >>> To satisfy the requirements of this document, the EAP lower-layer >>> identifier assigned by IANA (see Section 9.4) needs to be sent, in the EAP >>> Lower-Layer Attribute if RADIUS is used. >>> --> >>> >> >> [Authors] We believe the first proposal is ok >> To satisfy the requirements of this document, the EAP lower-layer >> identifier for CoAP-EAP (10) needs to be sent, in the EAP >> Lower-Layer Attribute if RADIUS is used. >> >> >> >>> >>> 34) <!-- [rfced] Section 8.6: Does "Step 0" here refer to Step 0 in >>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest >>> adding a citation for the appropriate figure. >>> >>> Original: >>> For instance, an attacker can forge >>> multiple initial messages to start an authentication (Step 0) with >>> the EAP authenticator as if they were sent by different EAP peers. --> >>> >> [Authors] we refer to Figure 3. >> >> >>> >>> 35) <!-- [rfced] Sections 9.1 and 9.2: The name "CoAP-EAP protocol" for the >>> new >>> registry group reads oddly, as it means "Constrained Application >>> Protocol-Extensible Authentication Protocol protocol". May we change the >>> name of the new registry group to "CoAP-EAP"? >>> >>> If yes, we will ask IANA to update the registry group name on >>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/coap-eap.xhtml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6tPX02Xg$ >>> >. >>> (We could not find an existing IANA registry with the name "CoAP-EAP", >>> so this name would be unique (but we would confirm this with IANA).) >>> >>> Original: >>> IANA has created a new registry titled "CoAP-EAP Cipher Suites" under >>> the new group name "CoAP-EAP protocol". >>> ... >>> IANA has created a new registry titled "CoAP-EAP Information element" >>> under the new group name "CoAP-EAP protocol". --> >>> >> [Authors] The suggested changes are ok for us. >> >> >>> >>> 36) <!-- [rfced] Section 9.2: Because there is no "Value" entity in the >>> "CoAP-EAP Information Elements" registry, we changed "Value" to >>> "Label" per >>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ >>> >. If this is >>> incorrect, please clarify the list of columns in the "CoAP-EAP >>> Information Elements" registry. >>> >>> Original: >>> The columns of the registry are Name, Label, CBOR Type, Description >>> and Reference, where Value is an integer, and the other columns are >>> text strings. >>> >>> Currently: >>> The columns of the registry are Name, Label, CBOR Type, Description, >>> and Reference, where Label is an integer and the other columns are >>> text strings. --> >>> >> [Authors] The proposed text is correct. >> >> >>> >>> 37) <!-- [rfced] [TS133.501]: We found a more recent version of this >>> specification. Because it appears that EAP will continue to be >>> mentioned in subsequent versions of this paper, may we update this >>> listing as follows? >>> >>> Original: >>> [TS133.501] >>> ETSI, "5G; Security architecture and procedures for 5G >>> System - TS 133 501 V15.2.0 (2018-10)", 2018. >>> >>> Suggested: >>> [TS133.501] >>> ETSI, "5G; Security architecture and procedures for 5G >>> System - TS 133 501 V18.9.0", April 2025, >>> https://urldefense.com/v3/__https://www.etsi.org/deliver/etsi_ts/133500_133599/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH47PGG_Jw$ >>> 133501/18.09.00_60/ts_133501v180900p.pdf --> >>> >>> >> >> [Authors] The suggestion is ok and very welcome. Thank you. >> >> >>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number. >>> We also found that >>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$ >>> > steers to >>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >>> >. When we searched >>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >>> > for >>> the number 095023r34, the result was "Nothing found, please try >>> adjusting your search." >>> >>> Should a different paper be listed here and cited in Appendices B and >>> C.5.1? >>> >>> Original: >>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document >>> 095023r34)", 2014. --> >>> >>> >> [Authors] Certainly, this seems to be an old reference. We have other >> examples, the best course of action would be to remove this reference and >> the associated text. >> Forced removal can be done by sending new specific key material to the >> devices that still belong to the network, excluding the removed device, >> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP >> [ZigbeeIP]. >> – >> Another example would be when a shared Network Key is required by the >> devices that join a network. An example of this Network Key can be found in >> Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD]. >> >> >> >>> 39) <!-- [rfced] We found a newer version (1.4.0) of the Thread >>> specification. As the citation in Appendix B is general in nature, >>> may we update this listing as suggested below? >>> >>> Original: >>> [THREAD] Thread Group, "Thread specification 1.3", 2023. >>> >>> Suggested: >>> [THREAD] Kumar, S. and E. Dijk, "Thread 1.4 Features White Paper", >>> September 2024, >>> <https://urldefense.com/v3/__https://www.threadgroup.org/Portals/0/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7aZUQuhA$ >>> Documents/ >>> Thread_1.4_Features_White_Paper_September_2024.pdf>. --> >>> >>> >> [Authors] The suggestion is ok and welcome. Thank you. >> >> >>> 40) <!-- [rfced] Figure 9: >>> >>> a) Please note that we changed "hanshake" to "handshake". However, >>> in the HTML and PDF output files, the space after the "e" in >>> "hanshake" was removed in the process. We cannot determine where in >>> the SVG a coordinate should be modified to correct the spacing. >>> Please correct the SVG in the edited copy of the XML. >>> >>> b) We see "down" arrows between MSK and DTLS_PSK in the ASCII art >>> for this figure, but they do not appear in the SVG. If you would >>> like to add the arrows in the SVG, please correct the SVG in the >>> edited copy of the XML. >>> >>> c) We see "(Protected with (D)TLS)" in the ASCII art but >>> "Protected with (D)TLS" in the SVG. If you prefer the parentheses, >>> please correct the SVG in the edited copy of the XML. If you prefer >>> that the parentheses be removed, let us know, and we will update the >>> ASCII art accordingly. --> >>> >> [Authors] New figure in rfc9820_modified.xml solves these issues. >> Also, for consistency, in Figure 3 there were no arrows indicating key >> derivation, we also updated that Figure in the xml file. >> >> >>> >>> 41) <!-- [rfced] Appendix A: >>> >>> a) As it appears that "Steps 1 and 2" here refer to Steps 1 and 2 in >>> Figure 8 (as opposed to Steps 1 and 2 in Figure 3), may we add a >>> citation for Figure 8 for ease of the reader? >>> >>> If the suggested text is not correct, please also clarify "if DTLS >>> wants to be used". >>> >>> Original: >>> To simplify the design in CoAP-EAP, the KDF hash algorithm >>> can be included in the list of cipher suites exchanged in Step 1 and >>> Step 2 if DTLS wants to be used instead of OSCORE. >>> >>> Suggested: >>> To simplify the design in CoAP-EAP, the KDF hash algorithm >>> can be included in the list of cipher suites exchanged in Steps 1 and >>> 2 (Figure 8) if one wants to use DTLS instead of OSCORE. >>> >> [Authors] The suggested text is ok. >> >> >>> b) Should "(RID-C) (RID-I)" be "RID-C || RID-I" per Appendix A.1? >>> >>> Original: >>> For the same >>> reason, the PSK identity is derived from (RID-C) (RID-I) as defined >>> in Appendix A.1. --> >>> >> >> [Authors] Yes, this is correct. "(RID-C) (RID-I)" should be "RID-C || RID-I" >> >> >>> >>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this >>> sentence, along the lines of "The other supported and negotiated >>> cipher suites are the following" as seen in Section 6.1? >>> >>> Original: >>> The hash algorithms considered are the following: >>> >>> * 5) TLS_SHA256 >>> >>> * 6) TLS_SHA384 >>> >>> * 7) TLS_SHA512 >>> >>> Possibly: >>> The following hash algorithms are supported: >>> >>> * 5) TLS_SHA256 >>> >>> * 6) TLS_SHA384 >>> >>> * 7) TLS_SHA512 --> >>> >> [Authors] Following the previous issue (point 25) >> Proposed text. >> The following hash algorithms are considered in case the specification >> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) >> >> >>> >>> 43) <!-- [rfced] Appendix A.1: Because the other equations in this >>> document don't end in periods, we removed the period from the end of >>> this equation. Please let us know any concerns. >>> >>> Original: >>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length). >>> >>> Currently: >>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length) --> >>> >> [Authors] The current proposed correction is ok. >> >> >>> >>> 44) <!-- [rfced] Appendix B: Because "PSK" stands for "Pre-Shared Key", >>> should "a shared key PSK" be "a PSK"? >>> >>> Original: >>> Similarly, to the example of Appendix A.1, where a shared key PSK for >>> DTLS is derived, it is possible to provide key material to different >>> link-layers after the CoAP-EAP authentication is complete. --> >>> >> [Authors] You are correct. "a shared key PSK" should be "a PSK" >> >> >>> >>> 45) <!-- [rfced] Appendix B: This sentence was difficult to follow. >>> We updated it as noted below. If this is incorrect, please clarify >>> the text. >>> >>> Original: >>> How a particular link-layer technology uses the MSK to derive further >>> key material for protecting the link-layer or use the OSCORE >>> protection to distribute key material is out of the scope of this >>> document. >>> >>> Currently (changed "uses the MSK ... or use the OSCORE protection" to >>> "uses the MSK ... or uses OSCORE protection"): >>> How a particular link-layer technology uses the MSK to derive further >>> key material for protecting the link layer or uses OSCORE protection >>> to distribute key material is outside the scope of this document. --> >>> >> [Authors] The currently suggested text is ok. >> >> >>> >>> 46) <!-- [rfced] Appendix C: "EAP peers (A and B), which are EAP peers. >>> They are the EAP peers." appeared to be some unintentionally repeated >>> text. We removed the extra text as noted below. If some additional >>> information for this bullet item was intended (for example, as was >>> done for the "EAP authenticator (C)" and "AAA server (AAA)" bullet >>> items), please provide the information. >>> >>> Original: >>> * 2 EAP peers (A and B), which are EAP peers. They are the EAP >>> peers. >>> >>> Currently: >>> * Two EAP peers (A and B). --> >>> >> [Authors] The currently suggested text is ok. >> >> >>> >>> 47) <!-- [rfced] Appendix C: "the EAP authenticator acts as an EAP >>> authenticator" read oddly and was difficult to follow. We updated >>> this sentence as noted below. If this update is incorrect, please >>> clarify the text. >>> >>> Original: >>> Here, the EAP authenticator acts as an EAP authenticator in pass- >>> through mode. >>> >>> Currently: >>> Here, the EAP authenticator is operating in pass- >>> through mode. --> >>> >> [Authors] The currently suggested text is ok. >> >> >>> >>> 48) <!-- [rfced] Appendix C: This sentence did not parse. We updated it >>> as noted below. If this is incorrect, please clarify "... methods >>> might need to be used (...) being able to ...". >>> >>> Original: >>> With varied EAP peers and >>> networks, more lightweight authentication methods might need to be >>> used (e.g., EAP-NOOB[RFC9140], EAP-AKA'[RFC5448], EAP-PSK[RFC4764], >>> EAP-EDHOC[I-D.ietf-emu-eap-edhoc], etc.) being able to adapt to >>> different types of devices according to organization policies or >>> devices capabilities. >>> >>> Currently: >>> With varied EAP peers and >>> networks, authentication methods that are more lightweight (e.g., >>> EAP-NOOB [RFC9140], EAP-AKA' [RFC5448], EAP-PSK [RFC4764], EAP-EDHOC >>> [EAP-EDHOC], etc.) and are able to adapt to different types of >>> devices according to organization policies or device capabilities >>> might need to be used. --> >>> >> [Authors] The currently suggested text is ok. >> >> >> >>> >>> 49) <!-- [rfced] Appendix C.1: Does "while" in this sentence mean "at >>> the same time as" or "as long as" (per the "as long as the key >>> material is still valid" phrase in the "It is worth noting that the >>> first phase ..." paragraph)? >>> >>> Original: >>> This access can be repeated without contacting the EAP >>> authenticator, while the credentials given to A are still valid. --> >>> >> [Authors] It means "as long as". >> >> >>> >>> 50) <!-- [rfced] Appendix C.1: We had trouble following the meaning of >>> "the first phase with CoAP-EAP". If the suggested text is not >>> correct, please provide clarifying text. >>> >>> Original: >>> It is worth noting that the first phase with CoAP-EAP is required to >>> join the EAP authenticator C's domain. >>> >>> Suggested: >>> It is worth noting that to join EAP authenticator C's domain, the >>> first phase (authentication via CoAP-EAP) is required. --> >>> >>> >> [Authors] The currently suggested text is ok. >> >>> 51) <!-- [rfced] Appendix C.2: >>> >>> a) Should "AKA" be "AKA'", as used elsewhere in this document? >>> >>> Original: >>> A device (A) of the domain acme.org, which uses a specific kind of >>> credential (e.g., AKA) and intends to join the um.es domain. >>> >> [Authors] This clarification adds more confusion than without it. Please >> leave it as follows >> >> A device (A) of the domain acme.org, which uses a specific kind of >> credential (e.g., AKA) and intends to join the um.es domain. >> >>> b) This sentence does not parse. It appears that some words are >>> missing. Please clarify "Through the local AAA server communicate >>> with the home AAA server ...". >>> >>> Original: >>> Through the local AAA server >>> communicate with the home AAA server to complete the authentication >>> and integrate the device as a trustworthy entity into the domain of >>> EAP authenticator C. --> >>> >> [Authors]The text hopefully is clearer as follows: >> Then, the local AAA server communicates with the home AAA server to complete >> the authentication. This way, the device can be considered as a trustworthy >> entity within the domain of the EAP authenticator C >> >> >>> >>> 52) <!-- [rfced] Appendix C.5.1: We corrected the incomplete >>> "Where can ..." sentence as follows. If this change is not correct, >>> please provide clarifying text. >>> >>> Original (the previous sentence is included for context): >>> For >>> example, in IEEE 802.15.4 networks, a new KMP ID can be defined to >>> add such support in the case of IEEE 802.15.9 [ieee802159]. Where >>> can be assumed that the device has at least a link-layer IPv6 >>> address. >>> >>> Currently (now one sentence that includes the expansion for "KMP"): >>> For >>> example, in IEEE 802.15.4 networks, a new Key Management Protocol >>> (KMP) ID can be defined to add such support in the case of IEEE >>> 802.15.9 [IEEE802159], where it can be assumed that the device has at >>> least a link-layer IPv6 address. --> >>> >> [Authors] The currently suggested text is ok. >> >> >>> >>> 53) <!-- [rfced] Appendix C.5.1: Per the phrase "entity (proxy) that is >>> already part of the network (already shares key material and >>> communicates through a secure channel with the authenticator)" in the >>> next paragraph of this section and per Figure 10, we updated this >>> sentence accordingly. If this is incorrect, please clarify what >>> communicates through a secure channel. >>> >>> Original: >>> In the case a proxy participates in CoAP- >>> EAP, it will be because it is already a trustworthy entity within the >>> domain, which communicates through a secure channel with the EAP >>> authenticator, as illustrated by Figure 10. >>> >>> Currently: >>> In the case that a proxy participates in >>> CoAP-EAP, it will be because it is already a trustworthy entity >>> within the domain and communicates through a secure channel with the >>> EAP authenticator, as illustrated by Figure 10. --> >>> >> [Authors] The currently suggested text is ok. >> >> >>> >>> 54) <!-- [rfced] Appendix C.5.1: This paragraph had several issues: >>> This section (Appendix C.5.1) cited itself, and in the second >>> sentence, "As mentioned, either ..." was unclear. Also, the >>> second sentence was incomplete. Please review all of our updates >>> carefully, and let us know if anything is incorrect. >>> >>> (Side note: We cited Section 3.6 here because although Section 3.1 >>> mentions both direct links and linking via a proxy, it doesn't >>> provide any descriptive text.) >>> >>> Original: >>> Thus, the EAP peer follows the same process described in >>> Appendix C.5.1 to perform the authentication. As mentioned, either >>> with a direct link to the EAP authenticator, or through an >>> intermediary entity (proxy) that is already part of the network >>> (already shares key material and communicates through a secure >>> channel with the authenticator) and can aid in running CoAP-EAP. >>> >>> Currently (the direct connection is mentioned in the previous >>> paragraph, so we did not mention it again here): >>> If the EAP peer cannot connect to the EAP authenticator directly, >>> the EAP peer can follow the same process as that described in >>> Section 3.6 to perform the authentication (i.e., can connect via >>> an intermediary entity (proxy) that is already part of the network >>> (already shares key material and communicates through a secure >>> channel with the authenticator) and can aid in running CoAP-EAP). --> >>> >> [Authors] The currently suggested text is ok. The only change would be to >> set proxy as example. >> … an intermediary entity (e.g., proxy) that is already part of the network >> >> >>> >>> 55) <!-- [rfced] Figure 10: We see "(security association)" in the ASCII >>> art but "security association" in the SVG. If you prefer the >>> parentheses, please correct the SVG in the edited copy of the XML. >>> If you prefer that the parentheses be removed, let us know, and we >>> will update the ASCII art accordingly. --> >>> >> [Authors] it is ok without parenthesis. >> >> >>> >>> 56) <!-- [rfced] Please review the "Inclusive Language" portion of >>> the online Style Guide at >>> <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7Wcxz1GQ$ >>> >, >>> and let us know if any changes are needed. Updates of this nature >>> typically result in more precise language, which is helpful for >>> readers. >>> >>> For example, please consider whether the following should be updated: >>> Master Session Key, Master Secret, Master Salt, Master Key --> >>> >>> >> [Authors] These are the same terms used in the EAP [RFC] standard and OSCORE >> standard [RFC] from which this work depends. It is needed to understand the >> terminology to which we refer. >> >>> 57) <!-- [rfced] Please let us know if any changes are needed for the >>> following: >>> >>> a) The following terms were used inconsistently in this document. >>> We chose to use the latter forms. Please let us know any objections. >>> >>> AAA Server / AAA server (per post-6000 published RFCs) >>> >> >> [AUTHORS] AAA server >>> Client registration (in running text) / >>> client registration (per RFC 9200) >>> >> >> [AUTHORS] client registration >>> b) The following terms appear to be used inconsistently in this >>> document. Please let us know which form is preferred. >>> >>> "a/eap/1" (the URI for the first resource would be "a/eap/1") / >>> '/a/eap/1' >>> >> >> [AUTHORS] "a/eap/1" >>> CBOR Object / CBOR object >> >> [AUTHORS] CBOR Object >>> >>> DTLS PSK / DTLS_PSK >> >> [AUTHORS] DTLS_PSK >>> >>> EAP Failure / EAP failure >>> (will send an EAP Failure, sends an EAP failure) >>> >> >> [AUTHORS] EAP Failure >>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id >>> >> [AUTHORS] EAP-Request/Identity >> >>> EAP response / EAP Response (used generally in text, e.g., >>> "an EAP response", "an EAP Response") >>> (We also see "EAP Response header" in Section 7.1.) >>> >> [AUTHORS] EAP Response >> >> >>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id >>> >> [AUTHORS] EAP-Response/Identity >> >> >>> EAP-X-Req (text) / EAP-X Req (Figure 3) >>> >> >> [AUTHORS] EAP-X-Req >> We updated the figures so they are consistent >>> EAP-X-Resp (text) / EAP-X Resp (Figures 3 and 9) >>> >> [AUTHORS] EAP-X-Resp >> >> >>> Network Key / network key >>> >> [AUTHORS] Network Key >> >> >>> Option(s) / option(s) (e.g., "Location-Path Option", >>> "Location-Path and/or Location-Query Options", >>> "Location-Path or Location-Query options", >>> "Location-Path (and/or Location-Query) Options", >>> "Location-Path (and/or Location-Query) options") >>> >> [AUTHORS] Option(s) >>> OSCORE Security Context / OSCORE security context >>> >> [AUTHORS] OSCORE Security Context >> >>> Session-Lifetime / Session-lifetime / Session Lifetime / >>> session lifetime (in running text) >>> (Figure 3 and Table 4 use "Session-Lifetime".) >>> >> [AUTHORS] Session-Lifetime >> >> >>> c) Should quoting and spacing be made consistent? For example: >>> >>> Quoting: '2.01 Created' / "2.01 Created" >> >> [Authors] ‘2.01 Created’ >>> >>> Spacing: Payload(EAP-X Resp) / Payload (EAP-X Resp) >> >> [Authors] without spacing between be parenthesis >>> >>> d) Should spacing after step numbers in figures be made >>> consistent? For example: >>> >>> ... >>> 0)| No-Response | >>> ... (Figure 3) >>> >>> ... >>> 0) | No-Response | >>> ... (Figure 5) --> >>> >>> >> >> [Authors] Without spacing is ok. >> >>> Thank you. >>> >>> RFC Editor/lb/rv >>> >> Thank you very much. >> >>> >>> >>>> On Jul 18, 2025, at 10:46 AM, rfc-edi...@rfc-editor.org wrote: >>> >>> *****IMPORTANT***** >>> >>> Updated 2025/07/18 >>> >>> RFC Author(s): >>> -------------- >>> >>> Instructions for Completing AUTH48 >>> >>> Your document has now entered AUTH48. Once it has been reviewed and >>> approved by you and all coauthors, it will be published as an RFC. >>> If an author is no longer available, there are several remedies >>> available as listed in the FAQ >>> (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4mckAP4A$ >>> ). >>> >>> You and you coauthors are responsible for engaging other parties >>> (e.g., Contributors or Working Group) as necessary before providing >>> your approval. >>> >>> Planning your review >>> --------------------- >>> >>> Please review the following aspects of your document: >>> >>> * RFC Editor questions >>> >>> Please review and resolve any questions raised by the RFC Editor >>> that have been included in the XML file as comments marked as >>> follows: >>> >>> <!-- [rfced] ... --> >>> >>> These questions will also be sent in a subsequent email. >>> >>> * Changes submitted by coauthors >>> >>> Please ensure that you review any changes submitted by your >>> coauthors. We assume that if you do not speak up that you >>> agree to changes submitted by your coauthors. >>> >>> * Content >>> >>> Please review the full content of the document, as this cannot >>> change once the RFC is published. Please pay particular attention to: >>> - IANA considerations updates (if applicable) >>> - contact information >>> - references >>> >>> * Copyright notices and legends >>> >>> Please review the copyright notice and legends as defined in >>> RFC 5378 and the Trust Legal Provisions >>> (TLP – >>> https://urldefense.com/v3/__https://trustee.ietf.org/license-info__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5D1hB7LA$ >>> ). >>> >>> * Semantic markup >>> >>> Please review the markup in the XML file to ensure that elements of >>> content are correctly tagged. For example, ensure that <sourcecode> >>> and <artwork> are set correctly. See details at >>> <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4qmIsbLQ$ >>> >. >>> >>> * Formatted output >>> >>> Please review the PDF, HTML, and TXT files to ensure that the >>> formatted output, as generated from the markup in the XML file, is >>> reasonable. Please note that the TXT will have formatting >>> limitations compared to the PDF and HTML. >>> >>> >>> Submitting changes >>> ------------------ >>> >>> To submit changes, please reply to this email using ‘REPLY ALL’ as all >>> the parties CCed on this message need to see your changes. The parties >>> include: >>> >>> * your coauthors >>> >>> * rfc-edi...@rfc-editor.org (the RPC team) >>> >>> * other document participants, depending on the stream (e.g., >>> IETF Stream participants are your working group chairs, the >>> responsible ADs, and the document shepherd). >>> >>> * auth48archive@rfc-editor.org, which is a new archival mailing list >>> to preserve AUTH48 conversations; it is not an active discussion >>> list: >>> >>> * More info: >>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH73FBctPw$ >>> >>> * The archive itself: >>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5RDfiTDg$ >>> >>> * Note: If only absolutely necessary, you may temporarily opt out >>> of the archiving of messages (e.g., to discuss a sensitive matter). >>> If needed, please add a note at the top of the message that you >>> have dropped the address. When the discussion is concluded, >>> auth48archive@rfc-editor.org will be re-added to the CC list and >>> its addition will be noted at the top of the message. >>> >>> You may submit your changes in one of two ways: >>> >>> An update to the provided XML file >>> — OR — >>> An explicit list of changes in this format >>> >>> Section # (or indicate Global) >>> >>> OLD: >>> old text >>> >>> NEW: >>> new text >>> >>> You do not need to reply with both an updated XML file and an explicit >>> list of changes, as either form is sufficient. >>> >>> We will ask a stream manager to review and approve any changes that seem >>> beyond editorial in nature, e.g., addition of new text, deletion of text, >>> and technical changes. Information about stream managers can be found in >>> the FAQ. Editorial changes do not require approval from a stream manager. >>> >>> >>> Approving for publication >>> -------------------------- >>> >>> To approve your RFC for publication, please reply to this email stating >>> that you approve this RFC for publication. Please use ‘REPLY ALL’, >>> as all the parties CCed on this message need to see your approval. >>> >>> >>> Files >>> ----- >>> >>> The files are available here: >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH61uj9KFA$ >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH46vzPMGQ$ >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4VnhbREw$ >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7CGA_kaw$ >>> >>> Diff file of the text: >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6IAS29qA$ >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6sl8fsTg$ >>> (side by side) >>> >>> Diff of the XML: >>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6VqyXnzw$ >>> >>> >>> Tracking progress >>> ----------------- >>> >>> The details of the AUTH48 status of your document are here: >>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9820__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH41wCjt6w$ >>> >>> Please let us know if you have any questions. >>> >>> Thank you for your cooperation, >>> >>> RFC Editor >>> >>> -------------------------------------- >>> RFC9820 (draft-ietf-ace-wg-coap-eap-15) >>> >>> Title : EAP-based Authentication Service for CoAP >>> Author(s) : R. Marin-Lopez, D. Garcia-Carrillo >>> WG Chair(s) : Loganaden Velvindron, Tim Hollebeek >>> >>> Area Director(s) : Deb Cooley, Paul Wouters >>> >>> >>> >> -- >> Dan García Carrillo >> --------------------- >> Associate Professor >> Dpto. de Informática, Área de Telemática, Universidad de Oviedo >> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón >> Dpcho. 2.7.8 - Edificio Polivalente >> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es >> <rfc9820_modified.xml> > -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org