Dear Dan and *AD (Paul),

Dan, thank you for your prompt reply!  We have added the missing slash and 
posted the latest files.

* Paul, please review the item below, and let us know if you approve:

> 1) <!-- [rfced] *AD, text was added to the Acknowledgments section after the
> document was approved for publication.  Please review the changes, and
> let us know if you approve.
> 
> Diff between v14 and v15:
> https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15 -->


The latest files are posted here.  Please refresh your browser:

   https://www.rfc-editor.org/authors/rfc9820.txt
   https://www.rfc-editor.org/authors/rfc9820.pdf
   https://www.rfc-editor.org/authors/rfc9820.html
   https://www.rfc-editor.org/authors/rfc9820.xml
   https://www.rfc-editor.org/authors/rfc9820-diff.html
   https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html (side by side)
   https://www.rfc-editor.org/authors/rfc9820-auth48diff.html
   https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html (side by side)
   https://www.rfc-editor.org/authors/rfc9820-lastdiff.html
   https://www.rfc-editor.org/authors/rfc9820-lastrfcdiff.html (side by side)

   https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html
   https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html

Thanks again!

RFC Editor/lb


> On Aug 13, 2025, at 5:47 AM, Dan Garcia Carrillo <garcia...@uniovi.es> wrote:
> 
> Dear RFC Editor,
> 
> Please, see answer inline.
> 
> 
> El 12/8/25 a las 19:34, Lynne Bartholomew escribió:
>> Dear Dan,
>> 
>> Thank you very much for your responses to our additional questions.
>> 
>> This item is still pending:
>> 
>>>> Also, please confirm that the single instance of "a/eap/1" is correct 
>>>> (i.e., "would be "a/eap/1" should not be "would be /a/eap/1").
>> 
>> Should the single instance of "a/eap/1" be "/a/eap/1"?  In other words, is 
>> it correct that this one instance does not include a slash before the "a"?  
>> We ask because of the entries we see in Figure 3.
>> 
>> Currently:
>>  So, per Figure 3, the URI for the first resource would be "a/eap/1".
>> 
>> = = = = =
> 
> 
> [Authors] It is missing the /. So, it would be
> 
> So, per Figure 3, the URI for the first resource would be "/a/eap/1".
> 
> Thank you.
> 
> Best regards,
> 
> Dan.
> 
> 
>> The latest files are posted here.  Please refresh your browser:
>> 
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-c7PkfZW$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-XVrunA0$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-fsUaGv7$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-TpW5UJZ$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-VoOjY-R$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-Tgq0UBI$
>>   (side by side)
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48diff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-VICEum7$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-Rfie6Ux$
>>   (side by side)
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-lastdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-TXoId9x$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-lastrfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-YbcEQdR$
>>   (side by side)
>> 
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-R7GbhlI$
>>    
>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-X18OhGE$
>> 
>> Thanks again!
>> 
>> RFC Editor/lb
>> 
>> 
>>> On Aug 8, 2025, at 3:39 AM, Dan Garcia Carrillo <garcia...@uniovi.es> wrote:
>>> 
>>> Dear RFC Editor,
>>> Please see responses inline.
>>> El 4/8/25 a las 21:02, Lynne Bartholomew escribió:
>>>> [You don't often get email from lbartholo...@staff.rfc-editor.org. Learn 
>>>> why this is important at 
>>>> https://urldefense.com/v3/__https://aka.ms/LearnAboutSenderIdentification__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-eZaWWpJ$
>>>>   ]
>>>> 
>>>> Dear Dan,
>>>> 
>>>> Thank you very much for the updated XML file and answers to our questions!
>>>> 
>>>> We have some follow-up items for you. Please let us know how this document 
>>>> should be further updated.
>>>> 
>>>> = = = = =
>>>> 
>>>> * Please note that per post-6000 published RFCs (except for RFC 8995), we 
>>>> changed '4.04 Not found' to '4.04 Not Found'. Please let us know any 
>>>> objections.
>>>> 
>>> [AUTHORS] No objections to the update.
>>> 
>>>> = = = = =
>>>> 
>>>> * Regarding our question 13) and your reply: As it appears that "Finally, 
>>>> sends" means "Finally, the CoAP-EAP application sends", per your note that 
>>>> the CoAP-EAP application takes control, we updated the "Step 2" text 
>>>> accordingly. If this is incorrect, please clarify the "Finally, sends" 
>>>> sentence.
>>>> 
>>> [AUTHORS] No objections to the text update. Yes, it is the CoAP-EAP 
>>> application.
>>> 
>>> 
>>>>>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the
>>>>>> EAP peer or the EAP peer state machine? If the suggested text is not
>>>>>> correct, please provide clarifying text.
>>>>>> 
>>>>>> Original (previous text is included for context):
>>>>>> * Step 2. The EAP peer processes the POST message sending the EAP
>>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns
>>>>>> an EAP response (EAP Resp/Id). Then, assigns a new resource to
>>>>>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes
>>>>>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created'
>>>>>> response with the new resource identifier in the Location-Path
>>>>>> (and/or Location-Query) options for the next step.
>>>>>> 
>>>>>> Suggested (guessing the EAP peer state machine):
>>>>>> * Step 2. The EAP peer processes the POST message, sending the EAP
>>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns
>>>>>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine
>>>>>> assigns a new resource to the ongoing authentication process
>>>>>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1').
>>>>>> Finally, the EAP peer state machine sends a '2.01 Created'
>>>>>> response with the new resource identifier in the Location-Path
>>>>>> (and/or Location-Query) options for the next step. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We believe the best way to specify this is to differentiate 
>>>>> between "EAP peer state machine" and the CoAP-EAP application of the EAP 
>>>>> peer.
>>>>> The EAP peer state machine only deals with EAP messages. Processes EAP 
>>>>> requests and returns an EAP response.
>>>>> With that, the CoAP-EAP application within the EAP peer takes control and 
>>>>> manages everything CoAP related. Assigns a new resource to the ongoing 
>>>>> authentication process (e.g., '/a/eap/2') and deletes the previous one 
>>>>> ('/a/eap/1')
>>>>> So, a suggested new text.
>>>>> Step 2. The EAP peer processes the POST message sending the EAP
>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns
>>>>> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application
>>>>> assigns a new resource to the ongoing authentication process
>>>>> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1').
>>>>> Finally, sends a '2.01 Created'response with the new resource
>>>>> identifier in the Location-Path (and/or Location-Query) options
>>>>> for the next step.
>>>>> 
>>>>> 
>>>> = = = = =
>>>> 
>>>> * Regarding our question 25) and your reply: Because of the preceding 
>>>> sentence ("The other supported and negotiated cipher suites are as 
>>>> follows:"), it was not clear to us how best to update this text. Please 
>>>> review our update, and let us know if anything is incorrect:
>>>> 
>>> [AUTHORS] No objections to the text update.
>>> 
>>> 
>>>>>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need
>>>>>> to be numbered? If yes, will this numbering scheme be clear to
>>>>>> readers?
>>>>>> 
>>>>>> Original:
>>>>>> * 0) AES-CCM-16-64-128, SHA-256 (default)
>>>>>> 
>>>>>> * 1) A128GCM, SHA-256
>>>>>> 
>>>>>> * 2) A256GCM, SHA-384
>>>>>> 
>>>>>> * 3) ChaCha20/Poly1305, SHA-256
>>>>>> 
>>>>>> * 4) ChaCha20/Poly1305, SHAKE256
>>>>>> ...
>>>>>> * 5) TLS_SHA256
>>>>>> 
>>>>>> * 6) TLS_SHA384
>>>>>> 
>>>>>> * 7) TLS_SHA512
>>>>>> 
>>>>>> Perhaps:
>>>>>> * AES-CCM-16-64-128, SHA-256 (default)
>>>>>> 
>>>>>> * A128GCM, SHA-256
>>>>>> 
>>>>>> * A256GCM, SHA-384
>>>>>> 
>>>>>> * ChaCha20/Poly1305, SHA-256
>>>>>> 
>>>>>> * ChaCha20/Poly1305, SHAKE256
>>>>>> ...
>>>>>> * TLS_SHA256
>>>>>> 
>>>>>> * TLS_SHA384
>>>>>> 
>>>>>> * TLS_SHA512
>>>>>> 
>>>>>> -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The numbers on Sections 6.1 match the values in “9.1. CoAP-EAP 
>>>>> Cipher Suites”.
>>>>> The numbers in Appendix A are the expected continuation of these, but are 
>>>>> not in the specification, and not in the IANA section. This text should 
>>>>> also solve issue 42 as well.
>>>>> Suggested update text:
>>>>> The following hash algorithms are considered in case the specification 
>>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512)
>>>>> 
>>>> = = = = =
>>>> 
>>>> * Regarding our question 38) and your reply: Please review our updates 
>>>> related to the removal of the Zigbee reference, and let us know if 
>>>> anything is incorrect.
>>>> 
>>>> 
>>> [AUTHORS] No objections to the text update.
>>> 
>>> 
>>>>>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number.
>>>>>> We also found that 
>>>>>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$
>>>>>>  > steers to
>>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$
>>>>>>  >. When we searched 
>>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$
>>>>>>  > for
>>>>>> the number 095023r34, the result was "Nothing found, please try
>>>>>> adjusting your search."
>>>>>> 
>>>>>> Should a different paper be listed here and cited in Appendices B and
>>>>>> C.5.1?
>>>>>> 
>>>>>> Original:
>>>>>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document
>>>>>> 095023r34)", 2014. -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] Certainly, this seems to be an old reference. We have other 
>>>>> examples, the best course of action would be to remove this reference and 
>>>>> the associated text.
>>>>> Forced removal can be done by sending new specific key material to the 
>>>>> devices that still belong to the network, excluding the removed device, 
>>>>> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP 
>>>>> [ZigbeeIP].
>>>>> –
>>>>> Another example would be when a shared Network Key is required by the 
>>>>> devices that join a network. An example of this Network Key can be found 
>>>>> in Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD].
>>>>> 
>>>> = = = = =
>>>> 
>>>> * Regarding our question 42) and your reply: Because TLS_SHA256, 
>>>> TLS_SHA384, and TLS_SHA512 are already in the list, is it necessary to 
>>>> also mention them in the preceding text?
>>>> 
>>>> 
>>>>>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this
>>>>>> sentence, along the lines of "The other supported and negotiated
>>>>>> cipher suites are the following" as seen in Section 6.1?
>>>>>> 
>>>>>> Original:
>>>>>> The hash algorithms considered are the following:
>>>>>> 
>>>>>> * 5) TLS_SHA256
>>>>>> 
>>>>>> * 6) TLS_SHA384
>>>>>> 
>>>>>> * 7) TLS_SHA512
>>>>>> 
>>>>>> Possibly:
>>>>>> The following hash algorithms are supported:
>>>>>> 
>>>>>> * 5) TLS_SHA256
>>>>>> 
>>>>>> * 6) TLS_SHA384
>>>>>> 
>>>>>> * 7) TLS_SHA512 -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Following the previous issue (point 25)
>>>>> Proposed text.
>>>>> The following hash algorithms are considered in case the specification 
>>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512)
>>>>> 
>>>> Possibly:
>>>> The following hash
>>>> algorithms are considered in cases where the specification includes DTLS 
>>>> support in the future:
>>>> 
>>> [AUTHORS] Having the ciphersuites already in the list, it is ok not to 
>>> mention them in the preceding text.
>>> 
>>> 
>>>> = = = = =
>>>> 
>>>> * Regarding our question 57) and the following items:
>>>> 
>>>> 
>>>>>> b) The following terms appear to be used inconsistently in this
>>>>>> document. Please let us know which form is preferred.
>>>>>> 
>>>>>> "a/eap/1" (the URI for the first resource would be "a/eap/1") /
>>>>>> '/a/eap/1'
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] "a/eap/1"
>>>>> 
>>>> Apologies for missing this earlier: We see the following:
>>>> 
>>>> 
>>>>> So, per Figure 3, the URI for the first resource would be "a/eap/1".
>>>>> 
>>>> We also see the following:
>>>> 
>>>> 
>>>>> '/a/eap/1'
>>>>> "/a/eap/1"
>>>>> 
>>>> Are single quotes or double quotes preferred?
>>>> Also, please confirm that the single instance of "a/eap/1" is correct 
>>>> (i.e., "would be "a/eap/1" should not be "would be /a/eap/1").
>>>> 
>>> [AUTHORS] Please, consider changing to double quotes.
>>> 
>>> 
>>> 
>>>> = = =
>>>> 
>>>> 
>>>>>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP-Request/Identity
>>>>> 
>>>>>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP-Response/Identity
>>>>> 
>>>> Apologies for not realizing earlier that using the longer forms 
>>>> "EAP-Request/Identity" and "EAP-Response/Identity" in Figures 3, 5, and 8 
>>>> could cause spacing issues in the SVG.
>>>> 
>>>> To avoid such spacing issues and define these terms properly where first 
>>>> used, we suggest the following:
>>>> 
>>>> - In Section 3.2, define the abbreviated forms by changing "(EAP 
>>>> Request/Identity)" to
>>>> "(EAP-Request/Identity, or EAP-Req/Id)" and changing "an EAP response (EAP 
>>>> Resp/Id)" to
>>>> "an EAP response (EAP-Response/Identity, or EAP-Resp/Id)".
>>>> - In Section 6.1, change "both the EAP-Request/Identity and 
>>>> EAP-Response/Identity" to
>>>> "both the EAP-Req/Id and EAP-Resp/Id".
>>>> - In Section 8.6, change "EAP Request/Id" to "EAP-Req/Id", and change "EAP 
>>>> Response/Id" to "EAP-Resp/Id".
>>>> 
>>>> 
>>> [AUTHORS] No objections to the text update.
>>> 
>>> 
>>>> = = =
>>>> 
>>>> Regarding this item:
>>>> 
>>>> 
>>>>>> EAP response / EAP Response (used generally in text, e.g.,
>>>>>> "an EAP response", "an EAP Response")
>>>>>> (We also see "EAP Response header" in Section 7.1.)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP Response
>>>>> 
>>>> Please confirm that "EAP Response" when used generally in text is as 
>>>> desired. We ask because we see "EAP request" used consistently throughout 
>>>> the text when used generally.
>>>> 
>>>> 
>>> [AUTHORS] Both should be Capitalized. EAP Response and EAP Request.
>>> 
>>> 
>>>> = = = = =
>>>> 
>>>> Regarding this item:
>>>> 
>>>> 
>>>>>> Session-Lifetime / Session-lifetime / Session Lifetime /
>>>>>> session lifetime (in running text)
>>>>>> (Figure 3 and Table 4 use "Session-Lifetime".)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] Session-Lifetime
>>>>> 
>>>> After updating "session lifetime" to "Session-Lifetime", this sentence is 
>>>> now a bit confusing, as RFC 5247
>>>> does not mention "Session-Lifetime". Should this sentence be rephrased, or 
>>>> will it be clear to readers?
>>>> 
>>>> Original:
>>>> * Step 7. When the EAP authentication ends successfully, the EAP
>>>> authenticator obtains the Master Session Key (MSK) exported by the
>>>> EAP method, an EAP Success message, and some authorization
>>>> information (e.g., session lifetime) [RFC5247].
>>>> 
>>>> Currently:
>>>> * Step 7. When the EAP authentication ends successfully, the EAP
>>>> authenticator obtains the MSK exported by the EAP method, an EAP
>>>> Success message, and some authorization information (e.g.,
>>>> Session-Lifetime) [RFC5247].
>>>> 
>>>> Possibly:
>>>> * Step 7. When the EAP authentication ends successfully, the EAP
>>>> authenticator obtains the MSK exported by the EAP method, an EAP
>>>> Success message, and some authorization information [RFC5247] (e.g.,
>>>> Session-Lifetime).
>>>> 
>>>> 
>>> [AUTHORS] It is correct that Session-Lifetime is not specified in RFC5247, 
>>> but it is something we propose to use as an authorization information 
>>> instance so the “Possibly” text is correct for us.
>>> 
>>> Thank you.
>>> Best regards.
>>> 
>>>> = = = = =
>>>> 
>>>> The latest files are posted here. Please refresh your browser:
>>>> 
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbJZA27Ts$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbMyfW1jC$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbLKsqN1X$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbP80vQJQ$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbH0Jmnq8$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbEun-yU8$
>>>>  (side by side)
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48diff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbJC23Knu$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbN_-hSIL$
>>>>  (side by side)
>>>> 
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbLA__aeT$
>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbNa1m-S9$
>>>> 
>>>> Thanks again for your help and patience!
>>>> 
>>>> RFC Editor/lb
>>>> 
>>>> 
>>>> 
>>>>> On Jul 29, 2025, at 10:09 AM, Dan Garcia Carrillo <garcia...@uniovi.es> 
>>>>> wrote:
>>>>> 
>>>>> Dear RFC Editor,
>>>>> Please see answers inline. For the requested clarifications in Figures, 
>>>>> we attach a .xml version with the figures updated.
>>>>> Please, let us know if anything else is required.
>>>>> 
>>>>> El 18/7/25 a las 19:53, rfc-edi...@rfc-editor.org escribió:
>>>>> 
>>>>>> Authors and AD*,
>>>>>> 
>>>>>> *AD, please see question #1 below.
>>>>>> 
>>>>>> Authors, while reviewing this document during AUTH48, please resolve (as 
>>>>>> necessary) the following questions, which are also in the XML file.
>>>>>> 
>>>>>> 
>>>>>> 1) <!-- [rfced] *AD, text was added to the Acknowledgments section after 
>>>>>> the
>>>>>> document was approved for publication.  Please review the changes, and
>>>>>> let us know if you approve.
>>>>>> 
>>>>>> Diff between v14 and v15:
>>>>>> https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH77QRYqZw$
>>>>>> -->
>>>>>> 
>>>>>> 
>>>>>> 2) <!-- [rfced] Please note that the title of the document has been 
>>>>>> updated as
>>>>>> follows. We expanded abbreviations per Section 3.6 of RFC 7322 ("RFC
>>>>>> Style Guide"), recast "-based" to avoid using a hyphen with an expansion,
>>>>>> and added "for Use with". Please review.
>>>>>> 
>>>>>> Original:
>>>>>> EAP-Based Authentication Service for CoAP
>>>>>> 
>>>>>> Current:
>>>>>> Authentication Service Based on the Extensible Authentication Protocol 
>>>>>> (EAP) for Use with the Constrained
>>>>>> Application Protocol (CoAP)
>>>>>> -->
>>>>>> 
>>>>>> 
>>>>> [Authors] This change is ok.
>>>>> 
>>>>>> 3) <!-- [rfced] Please insert any keywords (beyond those that appear in 
>>>>>> the
>>>>>> title) for use on 
>>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7N7e55Gg$
>>>>>>  >. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We believe that these could be keywords representing the work:
>>>>> 
>>>>> CoAP, EAP, EAP lower layer, Internet of Things, IoT, Constrained Node, 
>>>>> Smart Object
>>>>> 
>>>>> 
>>>>>> 4) <!-- [rfced] Abstract: We had trouble following the meaning of
>>>>>> "transported" in this sentence. If the suggested text is not
>>>>>> correct, please provide clarifying text.
>>>>>> 
>>>>>> Original:
>>>>>> This document specifies an authentication service that uses the
>>>>>> Extensible Authentication Protocol (EAP) transported employing
>>>>>> Constrained Application Protocol (CoAP) messages.
>>>>>> 
>>>>>> Suggested:
>>>>>> This document specifies an authentication service that uses the
>>>>>> Extensible Authentication Protocol (EAP) as a transport method that
>>>>>> employs Constrained Application Protocol (CoAP) messages. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text can be misleading as the protocol being 
>>>>> carried is EAP and the one that carries EAP is CoAP.
>>>>> Next, our suggested text would be:
>>>>> This document specifies an authentication service that uses the
>>>>> Constrained Application Protocol (CoAP) as a transport method to
>>>>> carry the Extensible Authentication Protocol (EAP).
>>>>> 
>>>>> 
>>>>> 
>>>>>> 5) <!-- [rfced] We found quite a few undefined abbreviations in this
>>>>>> document. For ease of the reader, we expanded as many of them as we
>>>>>> could find. Most were straightforward (e.g., SAML per RFC 7833,
>>>>>> PANA per RFC 5191), but please confirm that our expansions for MIC
>>>>>> (currently "Message Integrity Check") and LoRa (currently "Long
>>>>>> Range") are correct.
>>>>>> 
>>>>>> Original:
>>>>>> EAP relies on lower layer error
>>>>>> detection (e.g., CRC, checksum, MIC, etc.).
>>>>>> ...
>>>>>> Given that EAP is also used for network access authentication, this
>>>>>> service can be adapted to other technologies. For instance, to
>>>>>> provide network access control to very constrained technologies
>>>>>> (e.g., LoRa network).
>>>>>> 
>>>>>> Currently (fixed the incomplete sentence in the "LoRa" text):
>>>>>> EAP relies on lower-layer error
>>>>>> detection (e.g., CRC, checksum, Message Integrity Check (MIC),
>>>>>> etc.).
>>>>>> ...
>>>>>> Given that EAP is also used for network access authentication, this
>>>>>> service can be adapted to other technologies - for instance, to
>>>>>> provide network access control to very constrained technologies
>>>>>> (e.g., Long Range (LoRa) networks). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Yes, these suggestions are correct.
>>>>> 
>>>>> 
>>>>>> 6) <!-- [rfced] Section 2: These sentences did not parse. We updated
>>>>>> the text. If this is incorrect, please provide clarifying text.
>>>>>> 
>>>>>> Original:
>>>>>> The rationale behind this decision
>>>>>> is that EAP requests direction is always from the EAP server to the
>>>>>> EAP peer. Accordingly, EAP responses direction is always from the
>>>>>> EAP peer to the EAP server.
>>>>>> 
>>>>>> Currently:
>>>>>> The rationale behind this decision is that EAP requests will always
>>>>>> travel from the EAP server to the EAP peer. Accordingly, EAP
>>>>>> responses will always travel from the EAP peer to the EAP server. -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] Yes, these suggestions are correct.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 7) <!-- [rfced] Please review each artwork element. Should any artwork
>>>>>> element be tagged as sourcecode? If the current list of preferred
>>>>>> values for "type" on
>>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5spEm40g$
>>>>>>  >
>>>>>> does not contain an applicable type, please let us know. Also, it is
>>>>>> acceptable to leave the "type" attribute unset. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We assume that this is in reference to "Figure 6: CBOR Data 
>>>>> Structure for CoAP-EAP".
>>>>> It is not our intention to specify sourcecode, it could be left as type 
>>>>> unset.
>>>>> 
>>>>> 
>>>>>> 8) <!-- [rfced] Figure 1: We see "(SCOPE OF THIS DOCUMENT)" in the
>>>>>> ASCII art but "SCOPE OF THIS DOCUMENT" in the SVG. If you prefer the
>>>>>> parentheses, please correct the SVG in the edited copy of the XML.
>>>>>> If you prefer that the parentheses be removed, let us know, and we
>>>>>> will update the ASCII art accordingly. -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] There are no need for parentheses, the message is clear without 
>>>>> them.
>>>>> 
>>>>> 
>>>>>> 9) <!-- [rfced] Figure 2: We changed "Request/Responses/Signaling" to
>>>>>> "Request / Responses / Signaling", to match the spacing style of the
>>>>>> other entries in the figure. However, the "Request / Responses /
>>>>>> Signaling" line now looks a bit crowded in the SVG renderings in the
>>>>>> HTML and PDF output files. We cannot determine where in the SVG a
>>>>>> coordinate should be modified to correct the spacing. Please correct
>>>>>> the SVG in the edited copy of the XML. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The line should say
>>>>> Requests / Responses / Signaling
>>>>> 
>>>>> We have provided a new <artwork> code in the attached document 
>>>>> rfc9820_modified.xml that is not so crowded and tries to convey the 
>>>>> improvements.
>>>>> This is also updated in svg in the attached file rfc9820_modified.xml
>>>>> 
>>>>> 
>>>>>> 10) <!-- [rfced] Sections 3.1 and subsequent: We see phrases such as
>>>>>> "an intermediary proxy", "intermediary (i.e., proxy)", and
>>>>>> "intermediaries such as proxies" in this document. Will the
>>>>>> distinction regarding whether or not intermediaries are sometimes or
>>>>>> always proxies be clear to readers? -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We are following CoAP terminology, being according to rfc7252
>>>>> Intermediary
>>>>> A CoAP endpoint that acts both as a server and as a client towards an 
>>>>> origin server (possibly via further intermediaries). A common form of an 
>>>>> intermediary is a proxy; several classes of such proxies are discussed in 
>>>>> this specification.
>>>>> Maybe the following modifications would make this clearer to the reader.
>>>>> 3.1. Discovery
>>>>> Before the CoAP-EAP exchange takes place, the EAP peer needs to discover 
>>>>> the EAP authenticator or the entity that will enable the CoAP-EAP 
>>>>> exchange (e.g.i.e., an intermediary proxy).
>>>>> —-
>>>>> 8.3. Allowing CoAP-EAP Traffic to Perform Authentication
>>>>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP 
>>>>> connectivity in the link between the EAP peer and the EAP authenticator 
>>>>> to run. This link MUST authorize exclusively unprotected IP traffic to be 
>>>>> sent between the EAP peer and the EAP authenticator during the 
>>>>> authentication with CoAP-EAP. Once the authentication is successful, the 
>>>>> key material generated by the EAP authentication (MSK) and any other 
>>>>> traffic can be authorized if it is protected. It is worth noting that if 
>>>>> the EAP authenticator is not in the same link as the EAP peer and an 
>>>>> intermediate entity (i.e.e.g., a CoAP proxy) helps with this process, 
>>>>> this concept also applies to the communication between the EAP peer and 
>>>>> the intermediary.
>>>>> —-
>>>>> When the EAP peer intends to be admitted into the network, it would 
>>>>> search for an entity that offers the CoAP-EAP service, be it directly via 
>>>>> the EAP authenticator or through an intermediary (i.e.e.g., proxy). See 
>>>>> Section 3.1.
>>>>> —
>>>>> If the EAP peer cannot connect to the EAP authenticator directly, the EAP 
>>>>> peer can follow the same process as that described in Section 3.6 to 
>>>>> perform the authentication (i.e., can connect via an intermediary entity 
>>>>> (e.g., proxy) that is already part of the network (already shares key 
>>>>> material and communicates through a secure channel with the 
>>>>> authenticator) and can aid in running CoAP-EAP).
>>>>> —
>>>>> When CoAP-EAP is completed and the OSCORE security association is 
>>>>> established with the EAP authenticator, the EAP peer receives the local 
>>>>> configuration parameters for the network (e.g., a network key) and can 
>>>>> configure a global IPv6 address. Moreover, there is no need for a CoAP 
>>>>> proxy an intermediary entity after a successful authentication.
>>>>> 
>>>>> 
>>>>>> 11) <!-- [rfced] Section 3.1: This sentence does not parse. If neither
>>>>>> suggestion below is correct, please clarify the meaning of "hence".
>>>>>> 
>>>>>> Original:
>>>>>> For
>>>>>> example, on a 6LoWPAN network, the Border Router will typically act
>>>>>> as the EAP authenticator hence, after receiving the Router
>>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may
>>>>>> engage on the CoAP-EAP exchange.
>>>>>> 
>>>>>> Suggestion #1:
>>>>>> For
>>>>>> example, in a 6LoWPAN network, the Border Router will henceforth
>>>>>> typically act as the EAP authenticator. After receiving the Router
>>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may
>>>>>> engage in the CoAP-EAP exchange.
>>>>>> 
>>>>>> Suggestion #2:
>>>>>> For
>>>>>> example, in a 6LoWPAN network, the Border Router will typically act
>>>>>> as the EAP authenticator. Hence, after receiving the Router
>>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may
>>>>>> engage in the CoAP-EAP exchange. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Suggestion #2
>>>>> 
>>>>> 
>>>>>> 12) <!-- [rfced] Section 3.2: Please confirm that the "Implementation
>>>>>> notes" paragraph and bullet list should remain independent of Step 0
>>>>>> (i.e., should not be indented so that it is part of Step 0). We see
>>>>>> "resource of a step of the authentication" in the text, which seems
>>>>>> to indicate that this information applies to all steps and not just
>>>>>> Step 0, but we would still like you to confirm that the current
>>>>>> indentation levels are correct.
>>>>>> 
>>>>>> Original:
>>>>>> * Step 0. The EAP peer MUST start the CoAP-EAP process by sending a
>>>>>> "POST /.well-known/coap-eap" request (trigger message). This
>>>>>> message carries the 'No-Response' [RFC7967] CoAP option to avoid
>>>>>> waiting for a response that is not needed. This is the only
>>>>>> message where the EAP authenticator acts as a CoAP server and the
>>>>>> EAP peer as a CoAP client. The message also includes a URI in the
>>>>>> payload of the message to indicate the resource where the EAP
>>>>>> authenticator MUST send the next message. The name of the
>>>>>> resource is selected by the CoAP server.
>>>>>> 
>>>>>> Implementation notes: When generating the URI for a resource of a
>>>>>> step of the authentication, the resource could have the following
>>>>>> format as an example "path/eap/counter", where:
>>>>>> 
>>>>>> * "path" is some local path on the device to make the path unique.
>>>>>> This could be omitted if desired.
>>>>>> 
>>>>>> * "eap" is the name that indicates the URI is for the EAP peer.
>>>>>> This has no meaning for the protocol but helps with debugging.
>>>>>> 
>>>>>> * "counter' which is an incrementing unique number for every new EAP
>>>>>> request.
>>>>>> 
>>>>>> So, in Figure 3 for example, the URI for the first resource would be
>>>>>> “a/eap/1"
>>>>>> 
>>>>>> * Step 1. ... -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Yes, the "Implementation notes" paragraph and bullet list 
>>>>> should remain independent of Step 0
>>>>> 
>>>>> 
>>>>>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the
>>>>>> EAP peer or the EAP peer state machine? If the suggested text is not
>>>>>> correct, please provide clarifying text.
>>>>>> 
>>>>>> Original (previous text is included for context):
>>>>>> * Step 2. The EAP peer processes the POST message sending the EAP
>>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns
>>>>>> an EAP response (EAP Resp/Id). Then, assigns a new resource to
>>>>>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes
>>>>>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created'
>>>>>> response with the new resource identifier in the Location-Path
>>>>>> (and/or Location-Query) options for the next step.
>>>>>> 
>>>>>> Suggested (guessing the EAP peer state machine):
>>>>>> * Step 2. The EAP peer processes the POST message, sending the EAP
>>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns
>>>>>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine
>>>>>> assigns a new resource to the ongoing authentication process
>>>>>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1').
>>>>>> Finally, the EAP peer state machine sends a '2.01 Created'
>>>>>> response with the new resource identifier in the Location-Path
>>>>>> (and/or Location-Query) options for the next step. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We believe the best way to specify this is to differentiate 
>>>>> between "EAP peer state machine" and the CoAP-EAP application of the EAP 
>>>>> peer.
>>>>> The EAP peer state machine only deals with EAP messages. Processes EAP 
>>>>> requests and returns an EAP response.
>>>>> With that, the CoAP-EAP application within the EAP peer takes control and 
>>>>> manages everything CoAP related. Assigns a new resource to the ongoing 
>>>>> authentication process (e.g., '/a/eap/2') and deletes the previous one 
>>>>> ('/a/eap/1')
>>>>> So, a suggested new text.
>>>>> Step 2. The EAP peer processes the POST message sending the EAP
>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns
>>>>> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application
>>>>> assigns a new resource to the ongoing authentication process
>>>>> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1').
>>>>> Finally, sends a '2.01 Created'response with the new resource
>>>>> identifier in the Location-Path (and/or Location-Query) options
>>>>> for the next step.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 14) <!-- [rfced] Section 3.2: Please clarify the meaning of "response to
>>>>>> carry the EAP response" in this sentence.
>>>>>> 
>>>>>> Original:
>>>>>> The EAP peer will use a response to carry the EAP response in the
>>>>>> payload. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The text should say:
>>>>> The EAP peer will use a CoAP response to carry the EAP response in the 
>>>>> payload.
>>>>> 
>>>>> 
>>>>>> 15) <!-- [rfced] Section 3.5: The second sentence was incomplete and
>>>>>> difficult to follow. Per Sections 3.5.1 through 3.5.3, we updated
>>>>>> this section as noted below. If this is incorrect, please clarify.
>>>>>> 
>>>>>> Original:
>>>>>> This section elaborates on how different errors are handled. From
>>>>>> EAP authentication failure, a non-responsive endpoint lost messages,
>>>>>> or an initial POST message arriving out of place.
>>>>>> 
>>>>>> Currently:
>>>>>> This section elaborates on how different errors are handled: EAP
>>>>>> authentication failure (Section 3.5.1), a non-responsive endpoint
>>>>>> (Section 3.5.2), and duplicated messages (Section 3.5.3). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 16) <!-- [rfced] Section 3.5.2: We could not follow the meaning of this
>>>>>> run-on sentence. If the suggested text is not correct, please
>>>>>> provide clarifying text.
>>>>>> 
>>>>>> Original:
>>>>>> By default, CoAP-EAP adopts the
>>>>>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and
>>>>>> Authenticator to remove the CoAP-EAP state if the authentication
>>>>>> process has not progressed in that time, in consequence, it has not
>>>>>> been completed.
>>>>>> 
>>>>>> Suggested:
>>>>>> By default, CoAP-EAP adopts the
>>>>>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and
>>>>>> authenticator to remove the CoAP-EAP state if the authentication
>>>>>> process has not progressed to completion during that time. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>>> 17) <!-- [rfced] Section 3.5.3: Does "Step 0" here refer to Step 0 in
>>>>>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest
>>>>>> adding a citation for the appropriate figure.
>>>>>> 
>>>>>> Original:
>>>>>> The reception of the trigger message in Step 0 containing the URI
>>>>>> /coap-eap needs some additional considerations, as the resource is
>>>>>> always available in the EAP authenticator. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] This first instance of Step 0 is referring to the complete Flow 
>>>>> in Figure 3.
>>>>> The last instance refers to Figure 5.
>>>>> For clarity the text would be:
>>>>> The reception of the trigger message (Step 0 in Figure 3) containing the 
>>>>> URI /coap-eap needs some additional considerations, as the resource is 
>>>>> always available in the EAP authenticator.
>>>>> If a trigger message arrives at the EAP authenticator during an ongoing 
>>>>> authentication with the same EAP peer, the EAP authenticator MUST 
>>>>> silently discard this trigger message.
>>>>> If an old "POST /.well-known/coap-eap" (Step 0 in Figure 5) arrives at 
>>>>> the EAP authenticator and there is no authentication ongoing, the EAP 
>>>>> authenticator may understand that a new authentication process is 
>>>>> requested. Consequently, the EAP authenticator will start a new EAP 
>>>>> authentication. However, if the EAP peer did not start any authentication 
>>>>> and therefore, it did not select any resource for the EAP authentication. 
>>>>> Thus, the EAP peer sends a '4.04 Not Found' in the response.
>>>>> 
>>>>> 
>>>>>> 18) <!-- [rfced] Section 3.5.3: The "However, if ..." sentence is
>>>>>> incomplete; it appears that some words are missing. Please clarify
>>>>>> this text.
>>>>>> 
>>>>>> Original (the previous and next sentences are included for context):
>>>>>> Consequently, the EAP authenticator will start a new EAP
>>>>>> authentication. However, if the EAP peer did not start any
>>>>>> authentication and therefore, it did not select any resource for the
>>>>>> EAP authentication. Thus, the EAP peer sends a '4.04 Not found' in
>>>>>> the response (Figure 5). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Maybe this is simpler,
>>>>> “However, if the EAP peer did not start any authentication, it will send 
>>>>> a '4.04 Not found' in the response (Figure 5).”
>>>>> 
>>>>>> 19) <!-- [rfced] Section 3.6: The following sentences do not parse.
>>>>>> 
>>>>>> If the suggested text for the first sentence is not correct, please
>>>>>> provide clarifying text.
>>>>>> 
>>>>>> We cannot follow the meaning of the second sentence. Please clarify
>>>>>> "the proxy will act as forward, and as reverse for the rest".
>>>>>> 
>>>>>> Original (the first sentence is included for context):
>>>>>> After that, in the
>>>>>> remaining exchanges the roles are reversed, being the EAP peer, the
>>>>>> CoAP server, and the EAP authenticator, the CoAP client. When using
>>>>>> a proxy in the exchange, for message 0, the proxy will act as
>>>>>> forward, and as reverse for the rest.
>>>>>> 
>>>>>> Suggested (first sentence):
>>>>>> In the remaining exchanges, the roles are reversed (i.e., the EAP
>>>>>> peer acts as the CoAP server, and the EAP authenticator acts as the
>>>>>> CoAP client). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The text would be the following, hopefully it is clearer:
>>>>> In the remaining exchanges, the roles are reversed (i.e., the EAP
>>>>> peer acts as the CoAP server, and the EAP authenticator acts as the
>>>>> CoAP client). When using a proxy in the exchange, for message 0 it will 
>>>>> act as a forward proxy, and as a reverse proxy for the rest.
>>>>> 
>>>>>> 20) <!-- [rfced] Section 5: We found this sentence confusing, because
>>>>>> the plural "Examples" is used but the text that follows shows an
>>>>>> "either-or" relationship ("cipher suites that need to be negotiated
>>>>>> or ..."). If the suggested text is not correct, please provide
>>>>>> clarifying text.
>>>>>> 
>>>>>> Original (the previous sentence is included for context):
>>>>>> In the CoAP-EAP exchange, there is information that needs to be
>>>>>> exchanged between the two entities. Examples of this information are
>>>>>> the cipher suites that need to be negotiated or authorization
>>>>>> information (Session-lifetime).
>>>>>> 
>>>>>> Suggested:
>>>>>> In the CoAP-EAP exchange, information needs to be exchanged between
>>>>>> the two entities - for example, the cipher suites that need to be
>>>>>> negotiated, or authorization information (Session-lifetime). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 21) <!-- [rfced] Section 5: Per Figure 6, Table 4, and
>>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$
>>>>>>  >, we moved the RID-I item
>>>>>> so that it is the third item (Label 3, per Figure 6, Table 4, and
>>>>>> IANA) instead of the second; RID-C is now the second item.
>>>>>> Please let us know any objections.
>>>>>> 
>>>>>> Original:
>>>>>> 2. RID-I: Is the Recipient ID of the EAP peer. The EAP
>>>>>> authenticator uses this value as a Sender ID for its OSCORE
>>>>>> Sender Context. The EAP peer uses this value as Recipient ID for
>>>>>> its Recipient Context.
>>>>>> 
>>>>>> 3. RID-C: Is the Recipient ID of the EAP authenticator. The EAP
>>>>>> peer uses this value as a Sender ID for its OSCORE Sender
>>>>>> Context. The EAP authenticator uses this value as Recipient ID
>>>>>> for its Recipient Context.
>>>>>> 
>>>>>> Currently:
>>>>>> 2. RID-C: The Recipient ID of the EAP authenticator. The EAP peer
>>>>>> uses this value as the Sender ID for its OSCORE Sender Context.
>>>>>> The EAP authenticator uses this value as the Recipient ID for its
>>>>>> Recipient Context.
>>>>>> 
>>>>>> 3. RID-I: The Recipient ID of the EAP peer. The EAP authenticator
>>>>>> uses this value as the Sender ID for its OSCORE Sender Context.
>>>>>> The EAP peer uses this value as the Recipient ID for its
>>>>>> Recipient Context. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] No objection.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 22) <!-- [rfced] Section 6.1: Does "Steps 1 and 2" here refer to
>>>>>> Steps 1 and 2 in Figure 3 or Steps 1 and 2 in Figure 8?
>>>>>> For ease of the reader, we suggest adding a citation for the
>>>>>> appropriate figure.
>>>>>> 
>>>>>> Original:
>>>>>> OSCORE runs after the EAP authentication, using the cipher suite
>>>>>> selected in the cipher suite negotiation (Steps 1 and 2). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We refer to Figure 3 in the first instance. To Figure 8 in the 
>>>>> other instances in that section. Corrected text below:
>>>>> OSCORE runs after the EAP authentication, using the cipher suite selected 
>>>>> in the cipher suite negotiation (Steps 1 and 2 in Figure 3). To negotiate 
>>>>> the cipher suite, CoAP-EAP follows a simple approach: The EAP 
>>>>> authenticator sends a list, in decreasing order of preference, with the 
>>>>> identifiers of the supported cipher suites (Step 1 in Figure 8). In the 
>>>>> response to that message (Step 2 in Figure 8), the EAP peer sends its 
>>>>> choice.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 23) <!-- [rfced] Section 6.1: We had trouble following this sentence.
>>>>>> If the suggested text is not correct, please clarify "where it can be
>>>>>> appreciated the disposition".
>>>>>> 
>>>>>> Original:
>>>>>> An example of the exchange with the
>>>>>> cipher suite negotiation is shown in Figure 8, where it can be
>>>>>> appreciated the disposition of both EAP-Request/Identity and EAP-
>>>>>> Response/Identity, followed by the CBOR object defined in Section 5,
>>>>>> containing the cipher suite field for the cipher suite negotiation.
>>>>>> 
>>>>>> Suggested:
>>>>>> An example exchange for the
>>>>>> cipher suite negotiation is shown in Figure 8. The
>>>>>> EAP request (EAP-Request/Identity) and EAP response
>>>>>> (EAP-Response/Identity) are sent; both messages include the CBOR
>>>>>> object (Section 5) containing the cipher suite field for the cipher
>>>>>> suite negotiation. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>>> 24) <!-- [rfced] Figure 7: We note that the ASCII art has two pipes 
>>>>>> (with "+"
>>>>>> above each) between the "Data" and "cipher suites" fields, while the SVG
>>>>>> has vertical lines along with curved lines that intersect each
>>>>>> other. Please review and correct the edited copy of the XML if needed.
>>>>>> -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We provided a new Figure in the xml attached file that 
>>>>> hopefully is much more clearer.
>>>>> 
>>>>> 
>>>>>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need
>>>>>> to be numbered? If yes, will this numbering scheme be clear to
>>>>>> readers?
>>>>>> 
>>>>>> Original:
>>>>>> * 0) AES-CCM-16-64-128, SHA-256 (default)
>>>>>> 
>>>>>> * 1) A128GCM, SHA-256
>>>>>> 
>>>>>> * 2) A256GCM, SHA-384
>>>>>> 
>>>>>> * 3) ChaCha20/Poly1305, SHA-256
>>>>>> 
>>>>>> * 4) ChaCha20/Poly1305, SHAKE256
>>>>>> ...
>>>>>> * 5) TLS_SHA256
>>>>>> 
>>>>>> * 6) TLS_SHA384
>>>>>> 
>>>>>> * 7) TLS_SHA512
>>>>>> 
>>>>>> Perhaps:
>>>>>> * AES-CCM-16-64-128, SHA-256 (default)
>>>>>> 
>>>>>> * A128GCM, SHA-256
>>>>>> 
>>>>>> * A256GCM, SHA-384
>>>>>> 
>>>>>> * ChaCha20/Poly1305, SHA-256
>>>>>> 
>>>>>> * ChaCha20/Poly1305, SHAKE256
>>>>>> ...
>>>>>> * TLS_SHA256
>>>>>> 
>>>>>> * TLS_SHA384
>>>>>> 
>>>>>> * TLS_SHA512
>>>>>> 
>>>>>> -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The numbers on Sections 6.1 match the values in “9.1. CoAP-EAP 
>>>>> Cipher Suites”.
>>>>> The numbers in Appendix A are the expected continuation of these, but are 
>>>>> not in the specification, and not in the IANA section. This text should 
>>>>> also solve issue 42 as well.
>>>>> Suggested update text:
>>>>> The following hash algorithms are considered in case the specification 
>>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512)
>>>>> 
>>>>> 
>>>>>> 26) <!-- [rfced] Section 6.2: Does "Steps 7 and 8" here refer to
>>>>>> Steps 7 and 8 in Figure 3? If yes, for ease of the reader we suggest
>>>>>> adding a citation for Figure 3.
>>>>>> 
>>>>>> Original:
>>>>>> The derivation of the security context for OSCORE allows securing the
>>>>>> communication between the EAP peer and the EAP authenticator once the
>>>>>> MSK has been exported, providing confidentiality, integrity, key
>>>>>> confirmation (Steps 7 and 8), and downgrading attack detection. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Yes, we refer to Figure 3.
>>>>> 
>>>>> 
>>>>>> 27) <!-- [rfced] Section 6.2: We clarified these sentences as noted
>>>>>> below. If these updates are incorrect, please clarify "the cipher
>>>>>> suite 0".
>>>>>> 
>>>>>> Original:
>>>>>> If CS-C or CS-I were not sent, (i.e., default algorithms are used)
>>>>>> the value used to generate CS will be the same as if the default
>>>>>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR
>>>>>> array with the cipher suite 0).
>>>>>> ...
>>>>>> If CS-C or CS-I were not sent, (i.e., default algorithms are used)
>>>>>> the value used to generate CS will be the same as if the default
>>>>>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR
>>>>>> array with the cipher suite 0).
>>>>>> 
>>>>>> Currently:
>>>>>> If neither CS-C nor CS-I was sent (i.e., default algorithms are
>>>>>> used), the value used to generate CS will be the same as if the
>>>>>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a
>>>>>> CBOR array with the cipher suite value of 0).
>>>>>> ...
>>>>>> If neither CS-C nor CS-I was sent (i.e., default algorithms are
>>>>>> used), the value used to generate CS will be the same as if the
>>>>>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a
>>>>>> CBOR array with the cipher suite value of 0). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 28) <!-- [rfced] Please review instances of the term "NULL" as used in 
>>>>>> this
>>>>>> document and let us know if any updates are needed. We believe that
>>>>>> "NULL" should be updated to either "NUL" (that is, referring to the
>>>>>> specific ASCII control code) or "null". -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We mean the same as the instance you can find in rfc5191 of 
>>>>> PANA page 16
>>>>> - "IETF PANA" is the ASCII code representation of the non-NULL terminated 
>>>>> string (excluding the double quotes around it).
>>>>> 
>>>>> 
>>>>> 
>>>>>> 29) <!-- [rfced] Section 7.1: We changed this text as noted below.
>>>>>> Please review carefully (including our expansion of "AVP" for ease of
>>>>>> the reader), and let us know if anything is incorrect.
>>>>>> 
>>>>>> Original:
>>>>>> Note: When EAP
>>>>>> is proxied over an AAA framework, the Access-Request packets in
>>>>>> RADIUS MUST contain a Framed-MTU attribute with the value 1024, and
>>>>>> the Framed-MTU AVP to 1024 in DIAMETER This attribute signals the AAA
>>>>>> server that it should limit its responses to 1024 octets.
>>>>>> 
>>>>>> Currently:
>>>>>> Note: When EAP is proxied over a AAA framework, the
>>>>>> Access-Request packets in RADIUS MUST contain a Framed-MTU
>>>>>> attribute with a value of 1024 and, in Diameter, the Framed-MTU
>>>>>> Attribute-Value Pair (AVP) with a value of 1024. This information
>>>>>> signals the AAA server that it should limit its responses to 1024
>>>>>> octets. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 30) <!-- [rfced] Section 7.2: This sentence is difficult to parse. If
>>>>>> the suggested text is not correct, please rephrase "constrained
>>>>>> devices and network scenarios" and "older versions with the goal of
>>>>>> economization".
>>>>>> 
>>>>>> Also, please review and let us know whether this "Note:" item that is
>>>>>> set off in a separate paragraph should be in the <aside> element.
>>>>>> <aside> is defined as "a container for content that is semantically
>>>>>> less important or tangential to the content that surrounds it"
>>>>>> (https://urldefense.com/v3/__https://authors.ietf.org/en/rfcxml-vocabulary*aside__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5DOBldVg$
>>>>>>  ).
>>>>>> 
>>>>>> Original:
>>>>>> Note: For constrained devices and network scenarios, the use of the
>>>>>> latest versions of EAP methods (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3
>>>>>> [RFC9190]) is recommended in favor of older versions with the goal of
>>>>>> economization, or EAP methods more adapted for IoT (e.g., EAP-NOOB
>>>>>> [RFC9140], EAP-EDHOC [I-D.ietf-emu-eap-edhoc], etc.).
>>>>>> 
>>>>>> Suggested:
>>>>>> Note: To improve efficiency in environments with
>>>>>> constrained devices and networks, the latest versions of EAP methods
>>>>>> (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 [RFC9190]) are recommended over
>>>>>> older versions. EAP methods more adapted for IoT networks (e.g.,
>>>>>> EAP-NOOB [RFC9140], EAP-EDHOC [EAP-EDHOC], etc.) are also
>>>>>> recommended. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 31) <!-- [rfced] Section 8.2: This sentence did not parse. We updated
>>>>>> it as noted below. If this update is incorrect, please clarify
>>>>>> "can be with the transport of SAML".
>>>>>> 
>>>>>> Original:
>>>>>> Providing more fine-grained
>>>>>> authorization data can be with the transport of SAML in RADIUS
>>>>>> [RFC7833].
>>>>>> 
>>>>>> Currently:
>>>>>> Providing more fine-grained
>>>>>> authorization data can be done by transporting the data using the
>>>>>> Security Assertion Markup Language (SAML) in RADIUS [RFC7833]. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Currently suggested text is ok.
>>>>> 
>>>>>> 32) <!-- [rfced] Section 8.3:
>>>>>> 
>>>>>> a) To what does "exclusively" refer in this sentence? If the
>>>>>> suggested text is not correct, please clarify.
>>>>>> 
>>>>>> Original (the previous sentence is included for context):
>>>>>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP
>>>>>> connectivity in the link between the EAP peer and the EAP
>>>>>> authenticator to run. This link MUST authorize exclusively
>>>>>> unprotected IP traffic to be sent between the EAP peer and the EAP
>>>>>> authenticator during the authentication with CoAP-EAP.
>>>>>> 
>>>>>> Suggested:
>>>>>> This link MUST only authorize
>>>>>> unprotected IP traffic to be sent between the EAP peer and the EAP
>>>>>> authenticator during the authentication with CoAP-EAP.
>>>>>> 
>>>>>> 
>>>>> [Authors] We mean that this link will only allow unprotected traffic 
>>>>> between the EAP peer and the EAP for the purpose of running CoAP-EAP. Any 
>>>>> other traffic should not be allowed.
>>>>> 
>>>>> The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> b) This sentence did not parse. We updated it to make a complete
>>>>>> sentence. Please review this update carefully; if it is incorrect,
>>>>>> please clarify.
>>>>>> 
>>>>>> Original:
>>>>>> It is worth noting that if the EAP authenticator is not
>>>>>> in the same link as the EAP peer and an intermediate entity helps
>>>>>> with this process (i.e., CoAP proxy) and the same comment applies to
>>>>>> the communication between the EAP peer and the intermediary.
>>>>>> 
>>>>>> Currently:
>>>>>> It is worth noting that if the EAP authenticator is not
>>>>>> in the same link as the EAP peer and an intermediate entity (i.e., a
>>>>>> CoAP proxy) helps with this process, this concept also applies to the
>>>>>> communication between the EAP peer and the intermediary. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>>> 33) <!-- [rfced] Section 8.5: Does "the document" refer to RFC 6677 or
>>>>>> this document? Also, how may we update "(To be assigned by IANA)"?
>>>>>> 
>>>>>> Original (the previous paragraph is included for context):
>>>>>> According to the [RFC6677], channel binding, related to EAP, is sent
>>>>>> through the EAP method supporting it.
>>>>>> 
>>>>>> To satisfy the requirements of the document, the EAP lower layer
>>>>>> identifier (To be assigned by IANA) needs to be sent, in the EAP
>>>>>> Lower-Layer Attribute if RADIUS is used.
>>>>>> 
>>>>>> Perhaps:
>>>>>> To satisfy the requirements of this document, the EAP lower-layer
>>>>>> identifier for CoAP-EAP (10) needs to be sent, in the EAP
>>>>>> Lower-Layer Attribute if RADIUS is used.
>>>>>> 
>>>>>> Or:
>>>>>> To satisfy the requirements of this document, the EAP lower-layer
>>>>>> identifier assigned by IANA (see Section 9.4) needs to be sent, in the 
>>>>>> EAP
>>>>>> Lower-Layer Attribute if RADIUS is used.
>>>>>> -->
>>>>>> 
>>>>>> 
>>>>> [Authors] We believe the first proposal is ok
>>>>> To satisfy the requirements of this document, the EAP lower-layer
>>>>> identifier for CoAP-EAP (10) needs to be sent, in the EAP
>>>>> Lower-Layer Attribute if RADIUS is used.
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>>> 34) <!-- [rfced] Section 8.6: Does "Step 0" here refer to Step 0 in
>>>>>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest
>>>>>> adding a citation for the appropriate figure.
>>>>>> 
>>>>>> Original:
>>>>>> For instance, an attacker can forge
>>>>>> multiple initial messages to start an authentication (Step 0) with
>>>>>> the EAP authenticator as if they were sent by different EAP peers. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] we refer to Figure 3.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 35) <!-- [rfced] Sections 9.1 and 9.2: The name "CoAP-EAP protocol" for 
>>>>>> the new
>>>>>> registry group reads oddly, as it means "Constrained Application
>>>>>> Protocol-Extensible Authentication Protocol protocol". May we change the
>>>>>> name of the new registry group to "CoAP-EAP"?
>>>>>> 
>>>>>> If yes, we will ask IANA to update the registry group name on
>>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/coap-eap.xhtml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6tPX02Xg$
>>>>>>  >.
>>>>>> (We could not find an existing IANA registry with the name "CoAP-EAP",
>>>>>> so this name would be unique (but we would confirm this with IANA).)
>>>>>> 
>>>>>> Original:
>>>>>> IANA has created a new registry titled "CoAP-EAP Cipher Suites" under
>>>>>> the new group name "CoAP-EAP protocol".
>>>>>> ...
>>>>>> IANA has created a new registry titled "CoAP-EAP Information element"
>>>>>> under the new group name "CoAP-EAP protocol". -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested changes are ok for us.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 36) <!-- [rfced] Section 9.2: Because there is no "Value" entity in the
>>>>>> "CoAP-EAP Information Elements" registry, we changed "Value" to
>>>>>> "Label" per 
>>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$
>>>>>>  >. If this is
>>>>>> incorrect, please clarify the list of columns in the "CoAP-EAP
>>>>>> Information Elements" registry.
>>>>>> 
>>>>>> Original:
>>>>>> The columns of the registry are Name, Label, CBOR Type, Description
>>>>>> and Reference, where Value is an integer, and the other columns are
>>>>>> text strings.
>>>>>> 
>>>>>> Currently:
>>>>>> The columns of the registry are Name, Label, CBOR Type, Description,
>>>>>> and Reference, where Label is an integer and the other columns are
>>>>>> text strings. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The proposed text is correct.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 37) <!-- [rfced] [TS133.501]: We found a more recent version of this
>>>>>> specification. Because it appears that EAP will continue to be
>>>>>> mentioned in subsequent versions of this paper, may we update this
>>>>>> listing as follows?
>>>>>> 
>>>>>> Original:
>>>>>> [TS133.501]
>>>>>> ETSI, "5G; Security architecture and procedures for 5G
>>>>>> System - TS 133 501 V15.2.0 (2018-10)", 2018.
>>>>>> 
>>>>>> Suggested:
>>>>>> [TS133.501]
>>>>>> ETSI, "5G; Security architecture and procedures for 5G
>>>>>> System - TS 133 501 V18.9.0", April 2025,
>>>>>> https://urldefense.com/v3/__https://www.etsi.org/deliver/etsi_ts/133500_133599/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH47PGG_Jw$
>>>>>> 133501/18.09.00_60/ts_133501v180900p.pdf -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggestion is ok and very welcome. Thank you.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number.
>>>>>> We also found that 
>>>>>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$
>>>>>>  > steers to
>>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$
>>>>>>  >. When we searched 
>>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$
>>>>>>  > for
>>>>>> the number 095023r34, the result was "Nothing found, please try
>>>>>> adjusting your search."
>>>>>> 
>>>>>> Should a different paper be listed here and cited in Appendices B and
>>>>>> C.5.1?
>>>>>> 
>>>>>> Original:
>>>>>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document
>>>>>> 095023r34)", 2014. -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] Certainly, this seems to be an old reference. We have other 
>>>>> examples, the best course of action would be to remove this reference and 
>>>>> the associated text.
>>>>> Forced removal can be done by sending new specific key material to the 
>>>>> devices that still belong to the network, excluding the removed device, 
>>>>> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP 
>>>>> [ZigbeeIP].
>>>>> –
>>>>> Another example would be when a shared Network Key is required by the 
>>>>> devices that join a network. An example of this Network Key can be found 
>>>>> in Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD].
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>>> 39) <!-- [rfced] We found a newer version (1.4.0) of the Thread
>>>>>> specification. As the citation in Appendix B is general in nature,
>>>>>> may we update this listing as suggested below?
>>>>>> 
>>>>>> Original:
>>>>>> [THREAD] Thread Group, "Thread specification 1.3", 2023.
>>>>>> 
>>>>>> Suggested:
>>>>>> [THREAD] Kumar, S. and E. Dijk, "Thread 1.4 Features White Paper",
>>>>>> September 2024, 
>>>>>> <https://urldefense.com/v3/__https://www.threadgroup.org/Portals/0/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7aZUQuhA$
>>>>>> Documents/
>>>>>> Thread_1.4_Features_White_Paper_September_2024.pdf>. -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggestion is ok and welcome. Thank you.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 40) <!-- [rfced] Figure 9:
>>>>>> 
>>>>>> a) Please note that we changed "hanshake" to "handshake". However,
>>>>>> in the HTML and PDF output files, the space after the "e" in
>>>>>> "hanshake" was removed in the process. We cannot determine where in
>>>>>> the SVG a coordinate should be modified to correct the spacing.
>>>>>> Please correct the SVG in the edited copy of the XML.
>>>>>> 
>>>>>> b) We see "down" arrows between MSK and DTLS_PSK in the ASCII art
>>>>>> for this figure, but they do not appear in the SVG. If you would
>>>>>> like to add the arrows in the SVG, please correct the SVG in the
>>>>>> edited copy of the XML.
>>>>>> 
>>>>>> c) We see "(Protected with (D)TLS)" in the ASCII art but
>>>>>> "Protected with (D)TLS" in the SVG. If you prefer the parentheses,
>>>>>> please correct the SVG in the edited copy of the XML. If you prefer
>>>>>> that the parentheses be removed, let us know, and we will update the
>>>>>> ASCII art accordingly. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] New figure in rfc9820_modified.xml solves these issues.
>>>>> Also, for consistency, in Figure 3 there were no arrows indicating key 
>>>>> derivation, we also updated that Figure in the xml file.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 41) <!-- [rfced] Appendix A:
>>>>>> 
>>>>>> a) As it appears that "Steps 1 and 2" here refer to Steps 1 and 2 in
>>>>>> Figure 8 (as opposed to Steps 1 and 2 in Figure 3), may we add a
>>>>>> citation for Figure 8 for ease of the reader?
>>>>>> 
>>>>>> If the suggested text is not correct, please also clarify "if DTLS
>>>>>> wants to be used".
>>>>>> 
>>>>>> Original:
>>>>>> To simplify the design in CoAP-EAP, the KDF hash algorithm
>>>>>> can be included in the list of cipher suites exchanged in Step 1 and
>>>>>> Step 2 if DTLS wants to be used instead of OSCORE.
>>>>>> 
>>>>>> Suggested:
>>>>>> To simplify the design in CoAP-EAP, the KDF hash algorithm
>>>>>> can be included in the list of cipher suites exchanged in Steps 1 and
>>>>>> 2 (Figure 8) if one wants to use DTLS instead of OSCORE.
>>>>>> 
>>>>>> 
>>>>> [Authors] The suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> b) Should "(RID-C) (RID-I)" be "RID-C || RID-I" per Appendix A.1?
>>>>>> 
>>>>>> Original:
>>>>>> For the same
>>>>>> reason, the PSK identity is derived from (RID-C) (RID-I) as defined
>>>>>> in Appendix A.1. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Yes, this is correct. "(RID-C) (RID-I)" should be "RID-C || 
>>>>> RID-I"
>>>>> 
>>>>> 
>>>>> 
>>>>>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this
>>>>>> sentence, along the lines of "The other supported and negotiated
>>>>>> cipher suites are the following" as seen in Section 6.1?
>>>>>> 
>>>>>> Original:
>>>>>> The hash algorithms considered are the following:
>>>>>> 
>>>>>> * 5) TLS_SHA256
>>>>>> 
>>>>>> * 6) TLS_SHA384
>>>>>> 
>>>>>> * 7) TLS_SHA512
>>>>>> 
>>>>>> Possibly:
>>>>>> The following hash algorithms are supported:
>>>>>> 
>>>>>> * 5) TLS_SHA256
>>>>>> 
>>>>>> * 6) TLS_SHA384
>>>>>> 
>>>>>> * 7) TLS_SHA512 -->
>>>>>> 
>>>>>> 
>>>>> [Authors] Following the previous issue (point 25)
>>>>> Proposed text.
>>>>> The following hash algorithms are considered in case the specification 
>>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512)
>>>>> 
>>>>> 
>>>>> 
>>>>>> 43) <!-- [rfced] Appendix A.1: Because the other equations in this
>>>>>> document don't end in periods, we removed the period from the end of
>>>>>> this equation. Please let us know any concerns.
>>>>>> 
>>>>>> Original:
>>>>>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length).
>>>>>> 
>>>>>> Currently:
>>>>>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length) -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The current proposed correction is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 44) <!-- [rfced] Appendix B: Because "PSK" stands for "Pre-Shared Key",
>>>>>> should "a shared key PSK" be "a PSK"?
>>>>>> 
>>>>>> Original:
>>>>>> Similarly, to the example of Appendix A.1, where a shared key PSK for
>>>>>> DTLS is derived, it is possible to provide key material to different
>>>>>> link-layers after the CoAP-EAP authentication is complete. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] You are correct. "a shared key PSK" should be "a PSK"
>>>>> 
>>>>> 
>>>>> 
>>>>>> 45) <!-- [rfced] Appendix B: This sentence was difficult to follow.
>>>>>> We updated it as noted below. If this is incorrect, please clarify
>>>>>> the text.
>>>>>> 
>>>>>> Original:
>>>>>> How a particular link-layer technology uses the MSK to derive further
>>>>>> key material for protecting the link-layer or use the OSCORE
>>>>>> protection to distribute key material is out of the scope of this
>>>>>> document.
>>>>>> 
>>>>>> Currently (changed "uses the MSK ... or use the OSCORE protection" to
>>>>>> "uses the MSK ... or uses OSCORE protection"):
>>>>>> How a particular link-layer technology uses the MSK to derive further
>>>>>> key material for protecting the link layer or uses OSCORE protection
>>>>>> to distribute key material is outside the scope of this document. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 46) <!-- [rfced] Appendix C: "EAP peers (A and B), which are EAP peers.
>>>>>> They are the EAP peers." appeared to be some unintentionally repeated
>>>>>> text. We removed the extra text as noted below. If some additional
>>>>>> information for this bullet item was intended (for example, as was
>>>>>> done for the "EAP authenticator (C)" and "AAA server (AAA)" bullet
>>>>>> items), please provide the information.
>>>>>> 
>>>>>> Original:
>>>>>> * 2 EAP peers (A and B), which are EAP peers. They are the EAP
>>>>>> peers.
>>>>>> 
>>>>>> Currently:
>>>>>> * Two EAP peers (A and B). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 47) <!-- [rfced] Appendix C: "the EAP authenticator acts as an EAP
>>>>>> authenticator" read oddly and was difficult to follow. We updated
>>>>>> this sentence as noted below. If this update is incorrect, please
>>>>>> clarify the text.
>>>>>> 
>>>>>> Original:
>>>>>> Here, the EAP authenticator acts as an EAP authenticator in pass-
>>>>>> through mode.
>>>>>> 
>>>>>> Currently:
>>>>>> Here, the EAP authenticator is operating in pass-
>>>>>> through mode. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 48) <!-- [rfced] Appendix C: This sentence did not parse. We updated it
>>>>>> as noted below. If this is incorrect, please clarify "... methods
>>>>>> might need to be used (...) being able to ...".
>>>>>> 
>>>>>> Original:
>>>>>> With varied EAP peers and
>>>>>> networks, more lightweight authentication methods might need to be
>>>>>> used (e.g., EAP-NOOB[RFC9140], EAP-AKA'[RFC5448], EAP-PSK[RFC4764],
>>>>>> EAP-EDHOC[I-D.ietf-emu-eap-edhoc], etc.) being able to adapt to
>>>>>> different types of devices according to organization policies or
>>>>>> devices capabilities.
>>>>>> 
>>>>>> Currently:
>>>>>> With varied EAP peers and
>>>>>> networks, authentication methods that are more lightweight (e.g.,
>>>>>> EAP-NOOB [RFC9140], EAP-AKA' [RFC5448], EAP-PSK [RFC4764], EAP-EDHOC
>>>>>> [EAP-EDHOC], etc.) and are able to adapt to different types of
>>>>>> devices according to organization policies or device capabilities
>>>>>> might need to be used. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>>> 49) <!-- [rfced] Appendix C.1: Does "while" in this sentence mean "at
>>>>>> the same time as" or "as long as" (per the "as long as the key
>>>>>> material is still valid" phrase in the "It is worth noting that the
>>>>>> first phase ..." paragraph)?
>>>>>> 
>>>>>> Original:
>>>>>> This access can be repeated without contacting the EAP
>>>>>> authenticator, while the credentials given to A are still valid. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] It means "as long as".
>>>>> 
>>>>> 
>>>>> 
>>>>>> 50) <!-- [rfced] Appendix C.1: We had trouble following the meaning of
>>>>>> "the first phase with CoAP-EAP". If the suggested text is not
>>>>>> correct, please provide clarifying text.
>>>>>> 
>>>>>> Original:
>>>>>> It is worth noting that the first phase with CoAP-EAP is required to
>>>>>> join the EAP authenticator C's domain.
>>>>>> 
>>>>>> Suggested:
>>>>>> It is worth noting that to join EAP authenticator C's domain, the
>>>>>> first phase (authentication via CoAP-EAP) is required. -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>>> 51) <!-- [rfced] Appendix C.2:
>>>>>> 
>>>>>> a) Should "AKA" be "AKA'", as used elsewhere in this document?
>>>>>> 
>>>>>> Original:
>>>>>> A device (A) of the domain acme.org, which uses a specific kind of
>>>>>> credential (e.g., AKA) and intends to join the um.es domain.
>>>>>> 
>>>>>> 
>>>>> [Authors] This clarification adds more confusion than without it. Please 
>>>>> leave it as follows
>>>>> 
>>>>> A device (A) of the domain acme.org, which uses a specific kind of
>>>>> credential (e.g., AKA) and intends to join the um.es domain.
>>>>> 
>>>>> 
>>>>>> b) This sentence does not parse. It appears that some words are
>>>>>> missing. Please clarify "Through the local AAA server communicate
>>>>>> with the home AAA server ...".
>>>>>> 
>>>>>> Original:
>>>>>> Through the local AAA server
>>>>>> communicate with the home AAA server to complete the authentication
>>>>>> and integrate the device as a trustworthy entity into the domain of
>>>>>> EAP authenticator C. -->
>>>>>> 
>>>>>> 
>>>>> [Authors]The text hopefully is clearer as follows:
>>>>> Then, the local AAA server communicates with the home AAA server to 
>>>>> complete the authentication. This way, the device can be considered as a 
>>>>> trustworthy entity within the domain of the EAP authenticator C
>>>>> 
>>>>> 
>>>>> 
>>>>>> 52) <!-- [rfced] Appendix C.5.1: We corrected the incomplete
>>>>>> "Where can ..." sentence as follows. If this change is not correct,
>>>>>> please provide clarifying text.
>>>>>> 
>>>>>> Original (the previous sentence is included for context):
>>>>>> For
>>>>>> example, in IEEE 802.15.4 networks, a new KMP ID can be defined to
>>>>>> add such support in the case of IEEE 802.15.9 [ieee802159]. Where
>>>>>> can be assumed that the device has at least a link-layer IPv6
>>>>>> address.
>>>>>> 
>>>>>> Currently (now one sentence that includes the expansion for "KMP"):
>>>>>> For
>>>>>> example, in IEEE 802.15.4 networks, a new Key Management Protocol
>>>>>> (KMP) ID can be defined to add such support in the case of IEEE
>>>>>> 802.15.9 [IEEE802159], where it can be assumed that the device has at
>>>>>> least a link-layer IPv6 address. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 53) <!-- [rfced] Appendix C.5.1: Per the phrase "entity (proxy) that is
>>>>>> already part of the network (already shares key material and
>>>>>> communicates through a secure channel with the authenticator)" in the
>>>>>> next paragraph of this section and per Figure 10, we updated this
>>>>>> sentence accordingly. If this is incorrect, please clarify what
>>>>>> communicates through a secure channel.
>>>>>> 
>>>>>> Original:
>>>>>> In the case a proxy participates in CoAP-
>>>>>> EAP, it will be because it is already a trustworthy entity within the
>>>>>> domain, which communicates through a secure channel with the EAP
>>>>>> authenticator, as illustrated by Figure 10.
>>>>>> 
>>>>>> Currently:
>>>>>> In the case that a proxy participates in
>>>>>> CoAP-EAP, it will be because it is already a trustworthy entity
>>>>>> within the domain and communicates through a secure channel with the
>>>>>> EAP authenticator, as illustrated by Figure 10. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 54) <!-- [rfced] Appendix C.5.1: This paragraph had several issues:
>>>>>> This section (Appendix C.5.1) cited itself, and in the second
>>>>>> sentence, "As mentioned, either ..." was unclear. Also, the
>>>>>> second sentence was incomplete. Please review all of our updates
>>>>>> carefully, and let us know if anything is incorrect.
>>>>>> 
>>>>>> (Side note: We cited Section 3.6 here because although Section 3.1
>>>>>> mentions both direct links and linking via a proxy, it doesn't
>>>>>> provide any descriptive text.)
>>>>>> 
>>>>>> Original:
>>>>>> Thus, the EAP peer follows the same process described in
>>>>>> Appendix C.5.1 to perform the authentication. As mentioned, either
>>>>>> with a direct link to the EAP authenticator, or through an
>>>>>> intermediary entity (proxy) that is already part of the network
>>>>>> (already shares key material and communicates through a secure
>>>>>> channel with the authenticator) and can aid in running CoAP-EAP.
>>>>>> 
>>>>>> Currently (the direct connection is mentioned in the previous
>>>>>> paragraph, so we did not mention it again here):
>>>>>> If the EAP peer cannot connect to the EAP authenticator directly,
>>>>>> the EAP peer can follow the same process as that described in
>>>>>> Section 3.6 to perform the authentication (i.e., can connect via
>>>>>> an intermediary entity (proxy) that is already part of the network
>>>>>> (already shares key material and communicates through a secure
>>>>>> channel with the authenticator) and can aid in running CoAP-EAP). -->
>>>>>> 
>>>>>> 
>>>>> [Authors] The currently suggested text is ok. The only change would be to 
>>>>> set proxy as example.
>>>>> … an intermediary entity (e.g., proxy) that is already part of the network
>>>>> 
>>>>> 
>>>>> 
>>>>>> 55) <!-- [rfced] Figure 10: We see "(security association)" in the ASCII
>>>>>> art but "security association" in the SVG. If you prefer the
>>>>>> parentheses, please correct the SVG in the edited copy of the XML.
>>>>>> If you prefer that the parentheses be removed, let us know, and we
>>>>>> will update the ASCII art accordingly. -->
>>>>>> 
>>>>>> 
>>>>> [Authors] it is ok without parenthesis.
>>>>> 
>>>>> 
>>>>> 
>>>>>> 56) <!-- [rfced] Please review the "Inclusive Language" portion of
>>>>>> the online Style Guide at
>>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7Wcxz1GQ$
>>>>>>  >,
>>>>>> and let us know if any changes are needed. Updates of this nature
>>>>>> typically result in more precise language, which is helpful for
>>>>>> readers.
>>>>>> 
>>>>>> For example, please consider whether the following should be updated:
>>>>>> Master Session Key, Master Secret, Master Salt, Master Key -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] These are the same terms used in the EAP [RFC] standard and 
>>>>> OSCORE standard [RFC] from which this work depends. It is needed to 
>>>>> understand the terminology to which we refer.
>>>>> 
>>>>> 
>>>>>> 57) <!-- [rfced] Please let us know if any changes are needed for the
>>>>>> following:
>>>>>> 
>>>>>> a) The following terms were used inconsistently in this document.
>>>>>> We chose to use the latter forms. Please let us know any objections.
>>>>>> 
>>>>>> AAA Server / AAA server (per post-6000 published RFCs)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] AAA server
>>>>> 
>>>>>> Client registration (in running text) /
>>>>>> client registration (per RFC 9200)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] client registration
>>>>> 
>>>>>> b) The following terms appear to be used inconsistently in this
>>>>>> document. Please let us know which form is preferred.
>>>>>> 
>>>>>> "a/eap/1" (the URI for the first resource would be "a/eap/1") /
>>>>>> '/a/eap/1'
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] "a/eap/1"
>>>>> 
>>>>>> CBOR Object / CBOR object
>>>>>> 
>>>>> [AUTHORS] CBOR Object
>>>>> 
>>>>>> DTLS PSK / DTLS_PSK
>>>>>> 
>>>>> [AUTHORS] DTLS_PSK
>>>>> 
>>>>>> EAP Failure / EAP failure
>>>>>> (will send an EAP Failure, sends an EAP failure)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP Failure
>>>>> 
>>>>>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP-Request/Identity
>>>>> 
>>>>> 
>>>>>> EAP response / EAP Response (used generally in text, e.g.,
>>>>>> "an EAP response", "an EAP Response")
>>>>>> (We also see "EAP Response header" in Section 7.1.)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP Response
>>>>> 
>>>>> 
>>>>> 
>>>>>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP-Response/Identity
>>>>> 
>>>>> 
>>>>> 
>>>>>> EAP-X-Req (text) / EAP-X Req (Figure 3)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP-X-Req
>>>>> We updated the figures so they are consistent
>>>>> 
>>>>>> EAP-X-Resp (text) / EAP-X Resp (Figures 3 and 9)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] EAP-X-Resp
>>>>> 
>>>>> 
>>>>> 
>>>>>> Network Key / network key
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] Network Key
>>>>> 
>>>>> 
>>>>> 
>>>>>> Option(s) / option(s) (e.g., "Location-Path Option",
>>>>>> "Location-Path and/or Location-Query Options",
>>>>>> "Location-Path or Location-Query options",
>>>>>> "Location-Path (and/or Location-Query) Options",
>>>>>> "Location-Path (and/or Location-Query) options")
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] Option(s)
>>>>> 
>>>>>> OSCORE Security Context / OSCORE security context
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] OSCORE Security Context
>>>>> 
>>>>> 
>>>>>> Session-Lifetime / Session-lifetime / Session Lifetime /
>>>>>> session lifetime (in running text)
>>>>>> (Figure 3 and Table 4 use "Session-Lifetime".)
>>>>>> 
>>>>>> 
>>>>> [AUTHORS] Session-Lifetime
>>>>> 
>>>>> 
>>>>> 
>>>>>> c) Should quoting and spacing be made consistent? For example:
>>>>>> 
>>>>>> Quoting: '2.01 Created' / "2.01 Created"
>>>>>> 
>>>>> [Authors] ‘2.01 Created’
>>>>> 
>>>>>> Spacing: Payload(EAP-X Resp) / Payload (EAP-X Resp)
>>>>>> 
>>>>> [Authors] without spacing between be parenthesis
>>>>> 
>>>>>> d) Should spacing after step numbers in figures be made
>>>>>> consistent? For example:
>>>>>> 
>>>>>> ...
>>>>>> 0)| No-Response |
>>>>>> ... (Figure 3)
>>>>>> 
>>>>>> ...
>>>>>> 0) | No-Response |
>>>>>> ... (Figure 5) -->
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> [Authors] Without spacing is ok.
>>>>> 
>>>>> 
>>>>>> Thank you.
>>>>>> 
>>>>>> RFC Editor/lb/rv
>>>>>> 
>>>>>> 
>>>>> Thank you very much.
>>>>> 
>>>>> 
>>>>>> On Jul 18, 2025, at 10:46 AM, rfc-edi...@rfc-editor.org wrote:
>>>>>> 
>>>>>> *****IMPORTANT*****
>>>>>> 
>>>>>> Updated 2025/07/18
>>>>>> 
>>>>>> RFC Author(s):
>>>>>> --------------
>>>>>> 
>>>>>> Instructions for Completing AUTH48
>>>>>> 
>>>>>> Your document has now entered AUTH48. Once it has been reviewed and
>>>>>> approved by you and all coauthors, it will be published as an RFC.
>>>>>> If an author is no longer available, there are several remedies
>>>>>> available as listed in the FAQ 
>>>>>> (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4mckAP4A$
>>>>>>  ).
>>>>>> 
>>>>>> You and you coauthors are responsible for engaging other parties
>>>>>> (e.g., Contributors or Working Group) as necessary before providing
>>>>>> your approval.
>>>>>> 
>>>>>> Planning your review
>>>>>> ---------------------
>>>>>> 
>>>>>> Please review the following aspects of your document:
>>>>>> 
>>>>>> * RFC Editor questions
>>>>>> 
>>>>>> Please review and resolve any questions raised by the RFC Editor
>>>>>> that have been included in the XML file as comments marked as
>>>>>> follows:
>>>>>> 
>>>>>> <!-- [rfced] ... -->
>>>>>> 
>>>>>> These questions will also be sent in a subsequent email.
>>>>>> 
>>>>>> * Changes submitted by coauthors
>>>>>> 
>>>>>> Please ensure that you review any changes submitted by your
>>>>>> coauthors. We assume that if you do not speak up that you
>>>>>> agree to changes submitted by your coauthors.
>>>>>> 
>>>>>> * Content
>>>>>> 
>>>>>> Please review the full content of the document, as this cannot
>>>>>> change once the RFC is published. Please pay particular attention to:
>>>>>> - IANA considerations updates (if applicable)
>>>>>> - contact information
>>>>>> - references
>>>>>> 
>>>>>> * Copyright notices and legends
>>>>>> 
>>>>>> Please review the copyright notice and legends as defined in
>>>>>> RFC 5378 and the Trust Legal Provisions
>>>>>> (TLP – 
>>>>>> https://urldefense.com/v3/__https://trustee.ietf.org/license-info__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5D1hB7LA$
>>>>>>  ).
>>>>>> 
>>>>>> * Semantic markup
>>>>>> 
>>>>>> Please review the markup in the XML file to ensure that elements of
>>>>>> content are correctly tagged. For example, ensure that <sourcecode>
>>>>>> and <artwork> are set correctly. See details at
>>>>>> <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4qmIsbLQ$
>>>>>>  >.
>>>>>> 
>>>>>> * Formatted output
>>>>>> 
>>>>>> Please review the PDF, HTML, and TXT files to ensure that the
>>>>>> formatted output, as generated from the markup in the XML file, is
>>>>>> reasonable. Please note that the TXT will have formatting
>>>>>> limitations compared to the PDF and HTML.
>>>>>> 
>>>>>> 
>>>>>> Submitting changes
>>>>>> ------------------
>>>>>> 
>>>>>> To submit changes, please reply to this email using ‘REPLY ALL’ as all
>>>>>> the parties CCed on this message need to see your changes. The parties
>>>>>> include:
>>>>>> 
>>>>>> * your coauthors
>>>>>> 
>>>>>> * rfc-edi...@rfc-editor.org (the RPC team)
>>>>>> 
>>>>>> * other document participants, depending on the stream (e.g.,
>>>>>> IETF Stream participants are your working group chairs, the
>>>>>> responsible ADs, and the document shepherd).
>>>>>> 
>>>>>> * auth48archive@rfc-editor.org, which is a new archival mailing list
>>>>>> to preserve AUTH48 conversations; it is not an active discussion
>>>>>> list:
>>>>>> 
>>>>>> * More info:
>>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH73FBctPw$
>>>>>> 
>>>>>> * The archive itself:
>>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5RDfiTDg$
>>>>>> 
>>>>>> * Note: If only absolutely necessary, you may temporarily opt out
>>>>>> of the archiving of messages (e.g., to discuss a sensitive matter).
>>>>>> If needed, please add a note at the top of the message that you
>>>>>> have dropped the address. When the discussion is concluded,
>>>>>> auth48archive@rfc-editor.org will be re-added to the CC list and
>>>>>> its addition will be noted at the top of the message.
>>>>>> 
>>>>>> You may submit your changes in one of two ways:
>>>>>> 
>>>>>> An update to the provided XML file
>>>>>> — OR —
>>>>>> An explicit list of changes in this format
>>>>>> 
>>>>>> Section # (or indicate Global)
>>>>>> 
>>>>>> OLD:
>>>>>> old text
>>>>>> 
>>>>>> NEW:
>>>>>> new text
>>>>>> 
>>>>>> You do not need to reply with both an updated XML file and an explicit
>>>>>> list of changes, as either form is sufficient.
>>>>>> 
>>>>>> We will ask a stream manager to review and approve any changes that seem
>>>>>> beyond editorial in nature, e.g., addition of new text, deletion of text,
>>>>>> and technical changes. Information about stream managers can be found in
>>>>>> the FAQ. Editorial changes do not require approval from a stream manager.
>>>>>> 
>>>>>> 
>>>>>> Approving for publication
>>>>>> --------------------------
>>>>>> 
>>>>>> To approve your RFC for publication, please reply to this email stating
>>>>>> that you approve this RFC for publication. Please use ‘REPLY ALL’,
>>>>>> as all the parties CCed on this message need to see your approval.
>>>>>> 
>>>>>> 
>>>>>> Files
>>>>>> -----
>>>>>> 
>>>>>> The files are available here:
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH61uj9KFA$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH46vzPMGQ$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4VnhbREw$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7CGA_kaw$
>>>>>> 
>>>>>> Diff file of the text:
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6IAS29qA$
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6sl8fsTg$
>>>>>>  (side by side)
>>>>>> 
>>>>>> Diff of the XML:
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6VqyXnzw$
>>>>>> 
>>>>>> 
>>>>>> Tracking progress
>>>>>> -----------------
>>>>>> 
>>>>>> The details of the AUTH48 status of your document are here:
>>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9820__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH41wCjt6w$
>>>>>> 
>>>>>> Please let us know if you have any questions.
>>>>>> 
>>>>>> Thank you for your cooperation,
>>>>>> 
>>>>>> RFC Editor
>>>>>> 
>>>>>> --------------------------------------
>>>>>> RFC9820 (draft-ietf-ace-wg-coap-eap-15)
>>>>>> 
>>>>>> Title : EAP-based Authentication Service for CoAP
>>>>>> Author(s) : R. Marin-Lopez, D. Garcia-Carrillo
>>>>>> WG Chair(s) : Loganaden Velvindron, Tim Hollebeek
>>>>>> 
>>>>>> Area Director(s) : Deb Cooley, Paul Wouters
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>> --
>>>>> Dan García Carrillo
>>>>> ---------------------
>>>>> Associate Professor
>>>>> Dpto. de Informática, Área de Telemática, Universidad de Oviedo
>>>>> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón
>>>>> Dpcho. 2.7.8 - Edificio Polivalente
>>>>> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es
>>>>> <rfc9820_modified.xml>
>>>>> 
>>> -- 
>>> Dan García Carrillo
>>> ---------------------
>>> Associate Professor
>>> Dpto. de Informática, Área de Telemática, Universidad de Oviedo
>>> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón
>>> Dpcho. 2.7.8 - Edificio Polivalente
>>> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es


-- 
auth48archive mailing list -- auth48archive@rfc-editor.org
To unsubscribe send an email to auth48archive-le...@rfc-editor.org

Reply via email to