Dear Dan and *AD (Paul), Dan, thank you for your prompt reply! We have added the missing slash and posted the latest files.
* Paul, please review the item below, and let us know if you approve: > 1) <!-- [rfced] *AD, text was added to the Acknowledgments section after the > document was approved for publication. Please review the changes, and > let us know if you approve. > > Diff between v14 and v15: > https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15 --> The latest files are posted here. Please refresh your browser: https://www.rfc-editor.org/authors/rfc9820.txt https://www.rfc-editor.org/authors/rfc9820.pdf https://www.rfc-editor.org/authors/rfc9820.html https://www.rfc-editor.org/authors/rfc9820.xml https://www.rfc-editor.org/authors/rfc9820-diff.html https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html (side by side) https://www.rfc-editor.org/authors/rfc9820-auth48diff.html https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html (side by side) https://www.rfc-editor.org/authors/rfc9820-lastdiff.html https://www.rfc-editor.org/authors/rfc9820-lastrfcdiff.html (side by side) https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html Thanks again! RFC Editor/lb > On Aug 13, 2025, at 5:47 AM, Dan Garcia Carrillo <garcia...@uniovi.es> wrote: > > Dear RFC Editor, > > Please, see answer inline. > > > El 12/8/25 a las 19:34, Lynne Bartholomew escribió: >> Dear Dan, >> >> Thank you very much for your responses to our additional questions. >> >> This item is still pending: >> >>>> Also, please confirm that the single instance of "a/eap/1" is correct >>>> (i.e., "would be "a/eap/1" should not be "would be /a/eap/1"). >> >> Should the single instance of "a/eap/1" be "/a/eap/1"? In other words, is >> it correct that this one instance does not include a slash before the "a"? >> We ask because of the entries we see in Figure 3. >> >> Currently: >> So, per Figure 3, the URI for the first resource would be "a/eap/1". >> >> = = = = = > > > [Authors] It is missing the /. So, it would be > > So, per Figure 3, the URI for the first resource would be "/a/eap/1". > > Thank you. > > Best regards, > > Dan. > > >> The latest files are posted here. Please refresh your browser: >> >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-c7PkfZW$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-XVrunA0$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-fsUaGv7$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-TpW5UJZ$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-VoOjY-R$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-Tgq0UBI$ >> (side by side) >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48diff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-VICEum7$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-Rfie6Ux$ >> (side by side) >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-lastdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-TXoId9x$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-lastrfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-YbcEQdR$ >> (side by side) >> >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-R7GbhlI$ >> >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-X18OhGE$ >> >> Thanks again! >> >> RFC Editor/lb >> >> >>> On Aug 8, 2025, at 3:39 AM, Dan Garcia Carrillo <garcia...@uniovi.es> wrote: >>> >>> Dear RFC Editor, >>> Please see responses inline. >>> El 4/8/25 a las 21:02, Lynne Bartholomew escribió: >>>> [You don't often get email from lbartholo...@staff.rfc-editor.org. Learn >>>> why this is important at >>>> https://urldefense.com/v3/__https://aka.ms/LearnAboutSenderIdentification__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-eZaWWpJ$ >>>> ] >>>> >>>> Dear Dan, >>>> >>>> Thank you very much for the updated XML file and answers to our questions! >>>> >>>> We have some follow-up items for you. Please let us know how this document >>>> should be further updated. >>>> >>>> = = = = = >>>> >>>> * Please note that per post-6000 published RFCs (except for RFC 8995), we >>>> changed '4.04 Not found' to '4.04 Not Found'. Please let us know any >>>> objections. >>>> >>> [AUTHORS] No objections to the update. >>> >>>> = = = = = >>>> >>>> * Regarding our question 13) and your reply: As it appears that "Finally, >>>> sends" means "Finally, the CoAP-EAP application sends", per your note that >>>> the CoAP-EAP application takes control, we updated the "Step 2" text >>>> accordingly. If this is incorrect, please clarify the "Finally, sends" >>>> sentence. >>>> >>> [AUTHORS] No objections to the text update. Yes, it is the CoAP-EAP >>> application. >>> >>> >>>>>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the >>>>>> EAP peer or the EAP peer state machine? If the suggested text is not >>>>>> correct, please provide clarifying text. >>>>>> >>>>>> Original (previous text is included for context): >>>>>> * Step 2. The EAP peer processes the POST message sending the EAP >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>>>>> an EAP response (EAP Resp/Id). Then, assigns a new resource to >>>>>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes >>>>>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created' >>>>>> response with the new resource identifier in the Location-Path >>>>>> (and/or Location-Query) options for the next step. >>>>>> >>>>>> Suggested (guessing the EAP peer state machine): >>>>>> * Step 2. The EAP peer processes the POST message, sending the EAP >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>>>>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine >>>>>> assigns a new resource to the ongoing authentication process >>>>>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1'). >>>>>> Finally, the EAP peer state machine sends a '2.01 Created' >>>>>> response with the new resource identifier in the Location-Path >>>>>> (and/or Location-Query) options for the next step. --> >>>>>> >>>>>> >>>>> [Authors] We believe the best way to specify this is to differentiate >>>>> between "EAP peer state machine" and the CoAP-EAP application of the EAP >>>>> peer. >>>>> The EAP peer state machine only deals with EAP messages. Processes EAP >>>>> requests and returns an EAP response. >>>>> With that, the CoAP-EAP application within the EAP peer takes control and >>>>> manages everything CoAP related. Assigns a new resource to the ongoing >>>>> authentication process (e.g., '/a/eap/2') and deletes the previous one >>>>> ('/a/eap/1') >>>>> So, a suggested new text. >>>>> Step 2. The EAP peer processes the POST message sending the EAP >>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>>>> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application >>>>> assigns a new resource to the ongoing authentication process >>>>> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1'). >>>>> Finally, sends a '2.01 Created'response with the new resource >>>>> identifier in the Location-Path (and/or Location-Query) options >>>>> for the next step. >>>>> >>>>> >>>> = = = = = >>>> >>>> * Regarding our question 25) and your reply: Because of the preceding >>>> sentence ("The other supported and negotiated cipher suites are as >>>> follows:"), it was not clear to us how best to update this text. Please >>>> review our update, and let us know if anything is incorrect: >>>> >>> [AUTHORS] No objections to the text update. >>> >>> >>>>>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need >>>>>> to be numbered? If yes, will this numbering scheme be clear to >>>>>> readers? >>>>>> >>>>>> Original: >>>>>> * 0) AES-CCM-16-64-128, SHA-256 (default) >>>>>> >>>>>> * 1) A128GCM, SHA-256 >>>>>> >>>>>> * 2) A256GCM, SHA-384 >>>>>> >>>>>> * 3) ChaCha20/Poly1305, SHA-256 >>>>>> >>>>>> * 4) ChaCha20/Poly1305, SHAKE256 >>>>>> ... >>>>>> * 5) TLS_SHA256 >>>>>> >>>>>> * 6) TLS_SHA384 >>>>>> >>>>>> * 7) TLS_SHA512 >>>>>> >>>>>> Perhaps: >>>>>> * AES-CCM-16-64-128, SHA-256 (default) >>>>>> >>>>>> * A128GCM, SHA-256 >>>>>> >>>>>> * A256GCM, SHA-384 >>>>>> >>>>>> * ChaCha20/Poly1305, SHA-256 >>>>>> >>>>>> * ChaCha20/Poly1305, SHAKE256 >>>>>> ... >>>>>> * TLS_SHA256 >>>>>> >>>>>> * TLS_SHA384 >>>>>> >>>>>> * TLS_SHA512 >>>>>> >>>>>> --> >>>>>> >>>>>> >>>>> [Authors] The numbers on Sections 6.1 match the values in “9.1. CoAP-EAP >>>>> Cipher Suites”. >>>>> The numbers in Appendix A are the expected continuation of these, but are >>>>> not in the specification, and not in the IANA section. This text should >>>>> also solve issue 42 as well. >>>>> Suggested update text: >>>>> The following hash algorithms are considered in case the specification >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) >>>>> >>>> = = = = = >>>> >>>> * Regarding our question 38) and your reply: Please review our updates >>>> related to the removal of the Zigbee reference, and let us know if >>>> anything is incorrect. >>>> >>>> >>> [AUTHORS] No objections to the text update. >>> >>> >>>>>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number. >>>>>> We also found that >>>>>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$ >>>>>> > steers to >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >>>>>> >. When we searched >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >>>>>> > for >>>>>> the number 095023r34, the result was "Nothing found, please try >>>>>> adjusting your search." >>>>>> >>>>>> Should a different paper be listed here and cited in Appendices B and >>>>>> C.5.1? >>>>>> >>>>>> Original: >>>>>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document >>>>>> 095023r34)", 2014. --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] Certainly, this seems to be an old reference. We have other >>>>> examples, the best course of action would be to remove this reference and >>>>> the associated text. >>>>> Forced removal can be done by sending new specific key material to the >>>>> devices that still belong to the network, excluding the removed device, >>>>> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP >>>>> [ZigbeeIP]. >>>>> – >>>>> Another example would be when a shared Network Key is required by the >>>>> devices that join a network. An example of this Network Key can be found >>>>> in Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD]. >>>>> >>>> = = = = = >>>> >>>> * Regarding our question 42) and your reply: Because TLS_SHA256, >>>> TLS_SHA384, and TLS_SHA512 are already in the list, is it necessary to >>>> also mention them in the preceding text? >>>> >>>> >>>>>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this >>>>>> sentence, along the lines of "The other supported and negotiated >>>>>> cipher suites are the following" as seen in Section 6.1? >>>>>> >>>>>> Original: >>>>>> The hash algorithms considered are the following: >>>>>> >>>>>> * 5) TLS_SHA256 >>>>>> >>>>>> * 6) TLS_SHA384 >>>>>> >>>>>> * 7) TLS_SHA512 >>>>>> >>>>>> Possibly: >>>>>> The following hash algorithms are supported: >>>>>> >>>>>> * 5) TLS_SHA256 >>>>>> >>>>>> * 6) TLS_SHA384 >>>>>> >>>>>> * 7) TLS_SHA512 --> >>>>>> >>>>>> >>>>> [Authors] Following the previous issue (point 25) >>>>> Proposed text. >>>>> The following hash algorithms are considered in case the specification >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) >>>>> >>>> Possibly: >>>> The following hash >>>> algorithms are considered in cases where the specification includes DTLS >>>> support in the future: >>>> >>> [AUTHORS] Having the ciphersuites already in the list, it is ok not to >>> mention them in the preceding text. >>> >>> >>>> = = = = = >>>> >>>> * Regarding our question 57) and the following items: >>>> >>>> >>>>>> b) The following terms appear to be used inconsistently in this >>>>>> document. Please let us know which form is preferred. >>>>>> >>>>>> "a/eap/1" (the URI for the first resource would be "a/eap/1") / >>>>>> '/a/eap/1' >>>>>> >>>>>> >>>>> [AUTHORS] "a/eap/1" >>>>> >>>> Apologies for missing this earlier: We see the following: >>>> >>>> >>>>> So, per Figure 3, the URI for the first resource would be "a/eap/1". >>>>> >>>> We also see the following: >>>> >>>> >>>>> '/a/eap/1' >>>>> "/a/eap/1" >>>>> >>>> Are single quotes or double quotes preferred? >>>> Also, please confirm that the single instance of "a/eap/1" is correct >>>> (i.e., "would be "a/eap/1" should not be "would be /a/eap/1"). >>>> >>> [AUTHORS] Please, consider changing to double quotes. >>> >>> >>> >>>> = = = >>>> >>>> >>>>>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id >>>>>> >>>>>> >>>>> [AUTHORS] EAP-Request/Identity >>>>> >>>>>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id >>>>>> >>>>>> >>>>> [AUTHORS] EAP-Response/Identity >>>>> >>>> Apologies for not realizing earlier that using the longer forms >>>> "EAP-Request/Identity" and "EAP-Response/Identity" in Figures 3, 5, and 8 >>>> could cause spacing issues in the SVG. >>>> >>>> To avoid such spacing issues and define these terms properly where first >>>> used, we suggest the following: >>>> >>>> - In Section 3.2, define the abbreviated forms by changing "(EAP >>>> Request/Identity)" to >>>> "(EAP-Request/Identity, or EAP-Req/Id)" and changing "an EAP response (EAP >>>> Resp/Id)" to >>>> "an EAP response (EAP-Response/Identity, or EAP-Resp/Id)". >>>> - In Section 6.1, change "both the EAP-Request/Identity and >>>> EAP-Response/Identity" to >>>> "both the EAP-Req/Id and EAP-Resp/Id". >>>> - In Section 8.6, change "EAP Request/Id" to "EAP-Req/Id", and change "EAP >>>> Response/Id" to "EAP-Resp/Id". >>>> >>>> >>> [AUTHORS] No objections to the text update. >>> >>> >>>> = = = >>>> >>>> Regarding this item: >>>> >>>> >>>>>> EAP response / EAP Response (used generally in text, e.g., >>>>>> "an EAP response", "an EAP Response") >>>>>> (We also see "EAP Response header" in Section 7.1.) >>>>>> >>>>>> >>>>> [AUTHORS] EAP Response >>>>> >>>> Please confirm that "EAP Response" when used generally in text is as >>>> desired. We ask because we see "EAP request" used consistently throughout >>>> the text when used generally. >>>> >>>> >>> [AUTHORS] Both should be Capitalized. EAP Response and EAP Request. >>> >>> >>>> = = = = = >>>> >>>> Regarding this item: >>>> >>>> >>>>>> Session-Lifetime / Session-lifetime / Session Lifetime / >>>>>> session lifetime (in running text) >>>>>> (Figure 3 and Table 4 use "Session-Lifetime".) >>>>>> >>>>>> >>>>> [AUTHORS] Session-Lifetime >>>>> >>>> After updating "session lifetime" to "Session-Lifetime", this sentence is >>>> now a bit confusing, as RFC 5247 >>>> does not mention "Session-Lifetime". Should this sentence be rephrased, or >>>> will it be clear to readers? >>>> >>>> Original: >>>> * Step 7. When the EAP authentication ends successfully, the EAP >>>> authenticator obtains the Master Session Key (MSK) exported by the >>>> EAP method, an EAP Success message, and some authorization >>>> information (e.g., session lifetime) [RFC5247]. >>>> >>>> Currently: >>>> * Step 7. When the EAP authentication ends successfully, the EAP >>>> authenticator obtains the MSK exported by the EAP method, an EAP >>>> Success message, and some authorization information (e.g., >>>> Session-Lifetime) [RFC5247]. >>>> >>>> Possibly: >>>> * Step 7. When the EAP authentication ends successfully, the EAP >>>> authenticator obtains the MSK exported by the EAP method, an EAP >>>> Success message, and some authorization information [RFC5247] (e.g., >>>> Session-Lifetime). >>>> >>>> >>> [AUTHORS] It is correct that Session-Lifetime is not specified in RFC5247, >>> but it is something we propose to use as an authorization information >>> instance so the “Possibly” text is correct for us. >>> >>> Thank you. >>> Best regards. >>> >>>> = = = = = >>>> >>>> The latest files are posted here. Please refresh your browser: >>>> >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbJZA27Ts$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbMyfW1jC$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbLKsqN1X$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbP80vQJQ$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbH0Jmnq8$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbEun-yU8$ >>>> (side by side) >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48diff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbJC23Knu$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbN_-hSIL$ >>>> (side by side) >>>> >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbLA__aeT$ >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbNa1m-S9$ >>>> >>>> Thanks again for your help and patience! >>>> >>>> RFC Editor/lb >>>> >>>> >>>> >>>>> On Jul 29, 2025, at 10:09 AM, Dan Garcia Carrillo <garcia...@uniovi.es> >>>>> wrote: >>>>> >>>>> Dear RFC Editor, >>>>> Please see answers inline. For the requested clarifications in Figures, >>>>> we attach a .xml version with the figures updated. >>>>> Please, let us know if anything else is required. >>>>> >>>>> El 18/7/25 a las 19:53, rfc-edi...@rfc-editor.org escribió: >>>>> >>>>>> Authors and AD*, >>>>>> >>>>>> *AD, please see question #1 below. >>>>>> >>>>>> Authors, while reviewing this document during AUTH48, please resolve (as >>>>>> necessary) the following questions, which are also in the XML file. >>>>>> >>>>>> >>>>>> 1) <!-- [rfced] *AD, text was added to the Acknowledgments section after >>>>>> the >>>>>> document was approved for publication. Please review the changes, and >>>>>> let us know if you approve. >>>>>> >>>>>> Diff between v14 and v15: >>>>>> https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH77QRYqZw$ >>>>>> --> >>>>>> >>>>>> >>>>>> 2) <!-- [rfced] Please note that the title of the document has been >>>>>> updated as >>>>>> follows. We expanded abbreviations per Section 3.6 of RFC 7322 ("RFC >>>>>> Style Guide"), recast "-based" to avoid using a hyphen with an expansion, >>>>>> and added "for Use with". Please review. >>>>>> >>>>>> Original: >>>>>> EAP-Based Authentication Service for CoAP >>>>>> >>>>>> Current: >>>>>> Authentication Service Based on the Extensible Authentication Protocol >>>>>> (EAP) for Use with the Constrained >>>>>> Application Protocol (CoAP) >>>>>> --> >>>>>> >>>>>> >>>>> [Authors] This change is ok. >>>>> >>>>>> 3) <!-- [rfced] Please insert any keywords (beyond those that appear in >>>>>> the >>>>>> title) for use on >>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7N7e55Gg$ >>>>>> >. --> >>>>>> >>>>>> >>>>> [Authors] We believe that these could be keywords representing the work: >>>>> >>>>> CoAP, EAP, EAP lower layer, Internet of Things, IoT, Constrained Node, >>>>> Smart Object >>>>> >>>>> >>>>>> 4) <!-- [rfced] Abstract: We had trouble following the meaning of >>>>>> "transported" in this sentence. If the suggested text is not >>>>>> correct, please provide clarifying text. >>>>>> >>>>>> Original: >>>>>> This document specifies an authentication service that uses the >>>>>> Extensible Authentication Protocol (EAP) transported employing >>>>>> Constrained Application Protocol (CoAP) messages. >>>>>> >>>>>> Suggested: >>>>>> This document specifies an authentication service that uses the >>>>>> Extensible Authentication Protocol (EAP) as a transport method that >>>>>> employs Constrained Application Protocol (CoAP) messages. --> >>>>>> >>>>>> >>>>> [Authors] The suggested text can be misleading as the protocol being >>>>> carried is EAP and the one that carries EAP is CoAP. >>>>> Next, our suggested text would be: >>>>> This document specifies an authentication service that uses the >>>>> Constrained Application Protocol (CoAP) as a transport method to >>>>> carry the Extensible Authentication Protocol (EAP). >>>>> >>>>> >>>>> >>>>>> 5) <!-- [rfced] We found quite a few undefined abbreviations in this >>>>>> document. For ease of the reader, we expanded as many of them as we >>>>>> could find. Most were straightforward (e.g., SAML per RFC 7833, >>>>>> PANA per RFC 5191), but please confirm that our expansions for MIC >>>>>> (currently "Message Integrity Check") and LoRa (currently "Long >>>>>> Range") are correct. >>>>>> >>>>>> Original: >>>>>> EAP relies on lower layer error >>>>>> detection (e.g., CRC, checksum, MIC, etc.). >>>>>> ... >>>>>> Given that EAP is also used for network access authentication, this >>>>>> service can be adapted to other technologies. For instance, to >>>>>> provide network access control to very constrained technologies >>>>>> (e.g., LoRa network). >>>>>> >>>>>> Currently (fixed the incomplete sentence in the "LoRa" text): >>>>>> EAP relies on lower-layer error >>>>>> detection (e.g., CRC, checksum, Message Integrity Check (MIC), >>>>>> etc.). >>>>>> ... >>>>>> Given that EAP is also used for network access authentication, this >>>>>> service can be adapted to other technologies - for instance, to >>>>>> provide network access control to very constrained technologies >>>>>> (e.g., Long Range (LoRa) networks). --> >>>>>> >>>>>> >>>>> [Authors] Yes, these suggestions are correct. >>>>> >>>>> >>>>>> 6) <!-- [rfced] Section 2: These sentences did not parse. We updated >>>>>> the text. If this is incorrect, please provide clarifying text. >>>>>> >>>>>> Original: >>>>>> The rationale behind this decision >>>>>> is that EAP requests direction is always from the EAP server to the >>>>>> EAP peer. Accordingly, EAP responses direction is always from the >>>>>> EAP peer to the EAP server. >>>>>> >>>>>> Currently: >>>>>> The rationale behind this decision is that EAP requests will always >>>>>> travel from the EAP server to the EAP peer. Accordingly, EAP >>>>>> responses will always travel from the EAP peer to the EAP server. --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] Yes, these suggestions are correct. >>>>> >>>>> >>>>> >>>>>> 7) <!-- [rfced] Please review each artwork element. Should any artwork >>>>>> element be tagged as sourcecode? If the current list of preferred >>>>>> values for "type" on >>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5spEm40g$ >>>>>> > >>>>>> does not contain an applicable type, please let us know. Also, it is >>>>>> acceptable to leave the "type" attribute unset. --> >>>>>> >>>>>> >>>>> [Authors] We assume that this is in reference to "Figure 6: CBOR Data >>>>> Structure for CoAP-EAP". >>>>> It is not our intention to specify sourcecode, it could be left as type >>>>> unset. >>>>> >>>>> >>>>>> 8) <!-- [rfced] Figure 1: We see "(SCOPE OF THIS DOCUMENT)" in the >>>>>> ASCII art but "SCOPE OF THIS DOCUMENT" in the SVG. If you prefer the >>>>>> parentheses, please correct the SVG in the edited copy of the XML. >>>>>> If you prefer that the parentheses be removed, let us know, and we >>>>>> will update the ASCII art accordingly. --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] There are no need for parentheses, the message is clear without >>>>> them. >>>>> >>>>> >>>>>> 9) <!-- [rfced] Figure 2: We changed "Request/Responses/Signaling" to >>>>>> "Request / Responses / Signaling", to match the spacing style of the >>>>>> other entries in the figure. However, the "Request / Responses / >>>>>> Signaling" line now looks a bit crowded in the SVG renderings in the >>>>>> HTML and PDF output files. We cannot determine where in the SVG a >>>>>> coordinate should be modified to correct the spacing. Please correct >>>>>> the SVG in the edited copy of the XML. --> >>>>>> >>>>>> >>>>> [Authors] The line should say >>>>> Requests / Responses / Signaling >>>>> >>>>> We have provided a new <artwork> code in the attached document >>>>> rfc9820_modified.xml that is not so crowded and tries to convey the >>>>> improvements. >>>>> This is also updated in svg in the attached file rfc9820_modified.xml >>>>> >>>>> >>>>>> 10) <!-- [rfced] Sections 3.1 and subsequent: We see phrases such as >>>>>> "an intermediary proxy", "intermediary (i.e., proxy)", and >>>>>> "intermediaries such as proxies" in this document. Will the >>>>>> distinction regarding whether or not intermediaries are sometimes or >>>>>> always proxies be clear to readers? --> >>>>>> >>>>>> >>>>> [Authors] We are following CoAP terminology, being according to rfc7252 >>>>> Intermediary >>>>> A CoAP endpoint that acts both as a server and as a client towards an >>>>> origin server (possibly via further intermediaries). A common form of an >>>>> intermediary is a proxy; several classes of such proxies are discussed in >>>>> this specification. >>>>> Maybe the following modifications would make this clearer to the reader. >>>>> 3.1. Discovery >>>>> Before the CoAP-EAP exchange takes place, the EAP peer needs to discover >>>>> the EAP authenticator or the entity that will enable the CoAP-EAP >>>>> exchange (e.g.i.e., an intermediary proxy). >>>>> —- >>>>> 8.3. Allowing CoAP-EAP Traffic to Perform Authentication >>>>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP >>>>> connectivity in the link between the EAP peer and the EAP authenticator >>>>> to run. This link MUST authorize exclusively unprotected IP traffic to be >>>>> sent between the EAP peer and the EAP authenticator during the >>>>> authentication with CoAP-EAP. Once the authentication is successful, the >>>>> key material generated by the EAP authentication (MSK) and any other >>>>> traffic can be authorized if it is protected. It is worth noting that if >>>>> the EAP authenticator is not in the same link as the EAP peer and an >>>>> intermediate entity (i.e.e.g., a CoAP proxy) helps with this process, >>>>> this concept also applies to the communication between the EAP peer and >>>>> the intermediary. >>>>> —- >>>>> When the EAP peer intends to be admitted into the network, it would >>>>> search for an entity that offers the CoAP-EAP service, be it directly via >>>>> the EAP authenticator or through an intermediary (i.e.e.g., proxy). See >>>>> Section 3.1. >>>>> — >>>>> If the EAP peer cannot connect to the EAP authenticator directly, the EAP >>>>> peer can follow the same process as that described in Section 3.6 to >>>>> perform the authentication (i.e., can connect via an intermediary entity >>>>> (e.g., proxy) that is already part of the network (already shares key >>>>> material and communicates through a secure channel with the >>>>> authenticator) and can aid in running CoAP-EAP). >>>>> — >>>>> When CoAP-EAP is completed and the OSCORE security association is >>>>> established with the EAP authenticator, the EAP peer receives the local >>>>> configuration parameters for the network (e.g., a network key) and can >>>>> configure a global IPv6 address. Moreover, there is no need for a CoAP >>>>> proxy an intermediary entity after a successful authentication. >>>>> >>>>> >>>>>> 11) <!-- [rfced] Section 3.1: This sentence does not parse. If neither >>>>>> suggestion below is correct, please clarify the meaning of "hence". >>>>>> >>>>>> Original: >>>>>> For >>>>>> example, on a 6LoWPAN network, the Border Router will typically act >>>>>> as the EAP authenticator hence, after receiving the Router >>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may >>>>>> engage on the CoAP-EAP exchange. >>>>>> >>>>>> Suggestion #1: >>>>>> For >>>>>> example, in a 6LoWPAN network, the Border Router will henceforth >>>>>> typically act as the EAP authenticator. After receiving the Router >>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may >>>>>> engage in the CoAP-EAP exchange. >>>>>> >>>>>> Suggestion #2: >>>>>> For >>>>>> example, in a 6LoWPAN network, the Border Router will typically act >>>>>> as the EAP authenticator. Hence, after receiving the Router >>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may >>>>>> engage in the CoAP-EAP exchange. --> >>>>>> >>>>>> >>>>> [Authors] Suggestion #2 >>>>> >>>>> >>>>>> 12) <!-- [rfced] Section 3.2: Please confirm that the "Implementation >>>>>> notes" paragraph and bullet list should remain independent of Step 0 >>>>>> (i.e., should not be indented so that it is part of Step 0). We see >>>>>> "resource of a step of the authentication" in the text, which seems >>>>>> to indicate that this information applies to all steps and not just >>>>>> Step 0, but we would still like you to confirm that the current >>>>>> indentation levels are correct. >>>>>> >>>>>> Original: >>>>>> * Step 0. The EAP peer MUST start the CoAP-EAP process by sending a >>>>>> "POST /.well-known/coap-eap" request (trigger message). This >>>>>> message carries the 'No-Response' [RFC7967] CoAP option to avoid >>>>>> waiting for a response that is not needed. This is the only >>>>>> message where the EAP authenticator acts as a CoAP server and the >>>>>> EAP peer as a CoAP client. The message also includes a URI in the >>>>>> payload of the message to indicate the resource where the EAP >>>>>> authenticator MUST send the next message. The name of the >>>>>> resource is selected by the CoAP server. >>>>>> >>>>>> Implementation notes: When generating the URI for a resource of a >>>>>> step of the authentication, the resource could have the following >>>>>> format as an example "path/eap/counter", where: >>>>>> >>>>>> * "path" is some local path on the device to make the path unique. >>>>>> This could be omitted if desired. >>>>>> >>>>>> * "eap" is the name that indicates the URI is for the EAP peer. >>>>>> This has no meaning for the protocol but helps with debugging. >>>>>> >>>>>> * "counter' which is an incrementing unique number for every new EAP >>>>>> request. >>>>>> >>>>>> So, in Figure 3 for example, the URI for the first resource would be >>>>>> “a/eap/1" >>>>>> >>>>>> * Step 1. ... --> >>>>>> >>>>>> >>>>> [Authors] Yes, the "Implementation notes" paragraph and bullet list >>>>> should remain independent of Step 0 >>>>> >>>>> >>>>>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the >>>>>> EAP peer or the EAP peer state machine? If the suggested text is not >>>>>> correct, please provide clarifying text. >>>>>> >>>>>> Original (previous text is included for context): >>>>>> * Step 2. The EAP peer processes the POST message sending the EAP >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>>>>> an EAP response (EAP Resp/Id). Then, assigns a new resource to >>>>>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes >>>>>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created' >>>>>> response with the new resource identifier in the Location-Path >>>>>> (and/or Location-Query) options for the next step. >>>>>> >>>>>> Suggested (guessing the EAP peer state machine): >>>>>> * Step 2. The EAP peer processes the POST message, sending the EAP >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>>>>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine >>>>>> assigns a new resource to the ongoing authentication process >>>>>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1'). >>>>>> Finally, the EAP peer state machine sends a '2.01 Created' >>>>>> response with the new resource identifier in the Location-Path >>>>>> (and/or Location-Query) options for the next step. --> >>>>>> >>>>>> >>>>> [Authors] We believe the best way to specify this is to differentiate >>>>> between "EAP peer state machine" and the CoAP-EAP application of the EAP >>>>> peer. >>>>> The EAP peer state machine only deals with EAP messages. Processes EAP >>>>> requests and returns an EAP response. >>>>> With that, the CoAP-EAP application within the EAP peer takes control and >>>>> manages everything CoAP related. Assigns a new resource to the ongoing >>>>> authentication process (e.g., '/a/eap/2') and deletes the previous one >>>>> ('/a/eap/1') >>>>> So, a suggested new text. >>>>> Step 2. The EAP peer processes the POST message sending the EAP >>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns >>>>> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application >>>>> assigns a new resource to the ongoing authentication process >>>>> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1'). >>>>> Finally, sends a '2.01 Created'response with the new resource >>>>> identifier in the Location-Path (and/or Location-Query) options >>>>> for the next step. >>>>> >>>>> >>>>> >>>>>> 14) <!-- [rfced] Section 3.2: Please clarify the meaning of "response to >>>>>> carry the EAP response" in this sentence. >>>>>> >>>>>> Original: >>>>>> The EAP peer will use a response to carry the EAP response in the >>>>>> payload. --> >>>>>> >>>>>> >>>>> [Authors] The text should say: >>>>> The EAP peer will use a CoAP response to carry the EAP response in the >>>>> payload. >>>>> >>>>> >>>>>> 15) <!-- [rfced] Section 3.5: The second sentence was incomplete and >>>>>> difficult to follow. Per Sections 3.5.1 through 3.5.3, we updated >>>>>> this section as noted below. If this is incorrect, please clarify. >>>>>> >>>>>> Original: >>>>>> This section elaborates on how different errors are handled. From >>>>>> EAP authentication failure, a non-responsive endpoint lost messages, >>>>>> or an initial POST message arriving out of place. >>>>>> >>>>>> Currently: >>>>>> This section elaborates on how different errors are handled: EAP >>>>>> authentication failure (Section 3.5.1), a non-responsive endpoint >>>>>> (Section 3.5.2), and duplicated messages (Section 3.5.3). --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 16) <!-- [rfced] Section 3.5.2: We could not follow the meaning of this >>>>>> run-on sentence. If the suggested text is not correct, please >>>>>> provide clarifying text. >>>>>> >>>>>> Original: >>>>>> By default, CoAP-EAP adopts the >>>>>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and >>>>>> Authenticator to remove the CoAP-EAP state if the authentication >>>>>> process has not progressed in that time, in consequence, it has not >>>>>> been completed. >>>>>> >>>>>> Suggested: >>>>>> By default, CoAP-EAP adopts the >>>>>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and >>>>>> authenticator to remove the CoAP-EAP state if the authentication >>>>>> process has not progressed to completion during that time. --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>>> 17) <!-- [rfced] Section 3.5.3: Does "Step 0" here refer to Step 0 in >>>>>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest >>>>>> adding a citation for the appropriate figure. >>>>>> >>>>>> Original: >>>>>> The reception of the trigger message in Step 0 containing the URI >>>>>> /coap-eap needs some additional considerations, as the resource is >>>>>> always available in the EAP authenticator. --> >>>>>> >>>>>> >>>>> [Authors] This first instance of Step 0 is referring to the complete Flow >>>>> in Figure 3. >>>>> The last instance refers to Figure 5. >>>>> For clarity the text would be: >>>>> The reception of the trigger message (Step 0 in Figure 3) containing the >>>>> URI /coap-eap needs some additional considerations, as the resource is >>>>> always available in the EAP authenticator. >>>>> If a trigger message arrives at the EAP authenticator during an ongoing >>>>> authentication with the same EAP peer, the EAP authenticator MUST >>>>> silently discard this trigger message. >>>>> If an old "POST /.well-known/coap-eap" (Step 0 in Figure 5) arrives at >>>>> the EAP authenticator and there is no authentication ongoing, the EAP >>>>> authenticator may understand that a new authentication process is >>>>> requested. Consequently, the EAP authenticator will start a new EAP >>>>> authentication. However, if the EAP peer did not start any authentication >>>>> and therefore, it did not select any resource for the EAP authentication. >>>>> Thus, the EAP peer sends a '4.04 Not Found' in the response. >>>>> >>>>> >>>>>> 18) <!-- [rfced] Section 3.5.3: The "However, if ..." sentence is >>>>>> incomplete; it appears that some words are missing. Please clarify >>>>>> this text. >>>>>> >>>>>> Original (the previous and next sentences are included for context): >>>>>> Consequently, the EAP authenticator will start a new EAP >>>>>> authentication. However, if the EAP peer did not start any >>>>>> authentication and therefore, it did not select any resource for the >>>>>> EAP authentication. Thus, the EAP peer sends a '4.04 Not found' in >>>>>> the response (Figure 5). --> >>>>>> >>>>>> >>>>> [Authors] Maybe this is simpler, >>>>> “However, if the EAP peer did not start any authentication, it will send >>>>> a '4.04 Not found' in the response (Figure 5).” >>>>> >>>>>> 19) <!-- [rfced] Section 3.6: The following sentences do not parse. >>>>>> >>>>>> If the suggested text for the first sentence is not correct, please >>>>>> provide clarifying text. >>>>>> >>>>>> We cannot follow the meaning of the second sentence. Please clarify >>>>>> "the proxy will act as forward, and as reverse for the rest". >>>>>> >>>>>> Original (the first sentence is included for context): >>>>>> After that, in the >>>>>> remaining exchanges the roles are reversed, being the EAP peer, the >>>>>> CoAP server, and the EAP authenticator, the CoAP client. When using >>>>>> a proxy in the exchange, for message 0, the proxy will act as >>>>>> forward, and as reverse for the rest. >>>>>> >>>>>> Suggested (first sentence): >>>>>> In the remaining exchanges, the roles are reversed (i.e., the EAP >>>>>> peer acts as the CoAP server, and the EAP authenticator acts as the >>>>>> CoAP client). --> >>>>>> >>>>>> >>>>> [Authors] The text would be the following, hopefully it is clearer: >>>>> In the remaining exchanges, the roles are reversed (i.e., the EAP >>>>> peer acts as the CoAP server, and the EAP authenticator acts as the >>>>> CoAP client). When using a proxy in the exchange, for message 0 it will >>>>> act as a forward proxy, and as a reverse proxy for the rest. >>>>> >>>>>> 20) <!-- [rfced] Section 5: We found this sentence confusing, because >>>>>> the plural "Examples" is used but the text that follows shows an >>>>>> "either-or" relationship ("cipher suites that need to be negotiated >>>>>> or ..."). If the suggested text is not correct, please provide >>>>>> clarifying text. >>>>>> >>>>>> Original (the previous sentence is included for context): >>>>>> In the CoAP-EAP exchange, there is information that needs to be >>>>>> exchanged between the two entities. Examples of this information are >>>>>> the cipher suites that need to be negotiated or authorization >>>>>> information (Session-lifetime). >>>>>> >>>>>> Suggested: >>>>>> In the CoAP-EAP exchange, information needs to be exchanged between >>>>>> the two entities - for example, the cipher suites that need to be >>>>>> negotiated, or authorization information (Session-lifetime). --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 21) <!-- [rfced] Section 5: Per Figure 6, Table 4, and >>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ >>>>>> >, we moved the RID-I item >>>>>> so that it is the third item (Label 3, per Figure 6, Table 4, and >>>>>> IANA) instead of the second; RID-C is now the second item. >>>>>> Please let us know any objections. >>>>>> >>>>>> Original: >>>>>> 2. RID-I: Is the Recipient ID of the EAP peer. The EAP >>>>>> authenticator uses this value as a Sender ID for its OSCORE >>>>>> Sender Context. The EAP peer uses this value as Recipient ID for >>>>>> its Recipient Context. >>>>>> >>>>>> 3. RID-C: Is the Recipient ID of the EAP authenticator. The EAP >>>>>> peer uses this value as a Sender ID for its OSCORE Sender >>>>>> Context. The EAP authenticator uses this value as Recipient ID >>>>>> for its Recipient Context. >>>>>> >>>>>> Currently: >>>>>> 2. RID-C: The Recipient ID of the EAP authenticator. The EAP peer >>>>>> uses this value as the Sender ID for its OSCORE Sender Context. >>>>>> The EAP authenticator uses this value as the Recipient ID for its >>>>>> Recipient Context. >>>>>> >>>>>> 3. RID-I: The Recipient ID of the EAP peer. The EAP authenticator >>>>>> uses this value as the Sender ID for its OSCORE Sender Context. >>>>>> The EAP peer uses this value as the Recipient ID for its >>>>>> Recipient Context. --> >>>>>> >>>>>> >>>>> [Authors] No objection. >>>>> >>>>> >>>>> >>>>>> 22) <!-- [rfced] Section 6.1: Does "Steps 1 and 2" here refer to >>>>>> Steps 1 and 2 in Figure 3 or Steps 1 and 2 in Figure 8? >>>>>> For ease of the reader, we suggest adding a citation for the >>>>>> appropriate figure. >>>>>> >>>>>> Original: >>>>>> OSCORE runs after the EAP authentication, using the cipher suite >>>>>> selected in the cipher suite negotiation (Steps 1 and 2). --> >>>>>> >>>>>> >>>>> [Authors] We refer to Figure 3 in the first instance. To Figure 8 in the >>>>> other instances in that section. Corrected text below: >>>>> OSCORE runs after the EAP authentication, using the cipher suite selected >>>>> in the cipher suite negotiation (Steps 1 and 2 in Figure 3). To negotiate >>>>> the cipher suite, CoAP-EAP follows a simple approach: The EAP >>>>> authenticator sends a list, in decreasing order of preference, with the >>>>> identifiers of the supported cipher suites (Step 1 in Figure 8). In the >>>>> response to that message (Step 2 in Figure 8), the EAP peer sends its >>>>> choice. >>>>> >>>>> >>>>> >>>>>> 23) <!-- [rfced] Section 6.1: We had trouble following this sentence. >>>>>> If the suggested text is not correct, please clarify "where it can be >>>>>> appreciated the disposition". >>>>>> >>>>>> Original: >>>>>> An example of the exchange with the >>>>>> cipher suite negotiation is shown in Figure 8, where it can be >>>>>> appreciated the disposition of both EAP-Request/Identity and EAP- >>>>>> Response/Identity, followed by the CBOR object defined in Section 5, >>>>>> containing the cipher suite field for the cipher suite negotiation. >>>>>> >>>>>> Suggested: >>>>>> An example exchange for the >>>>>> cipher suite negotiation is shown in Figure 8. The >>>>>> EAP request (EAP-Request/Identity) and EAP response >>>>>> (EAP-Response/Identity) are sent; both messages include the CBOR >>>>>> object (Section 5) containing the cipher suite field for the cipher >>>>>> suite negotiation. --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok >>>>> >>>>> >>>>> >>>>> >>>>>> 24) <!-- [rfced] Figure 7: We note that the ASCII art has two pipes >>>>>> (with "+" >>>>>> above each) between the "Data" and "cipher suites" fields, while the SVG >>>>>> has vertical lines along with curved lines that intersect each >>>>>> other. Please review and correct the edited copy of the XML if needed. >>>>>> --> >>>>>> >>>>>> >>>>> [Authors] We provided a new Figure in the xml attached file that >>>>> hopefully is much more clearer. >>>>> >>>>> >>>>>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need >>>>>> to be numbered? If yes, will this numbering scheme be clear to >>>>>> readers? >>>>>> >>>>>> Original: >>>>>> * 0) AES-CCM-16-64-128, SHA-256 (default) >>>>>> >>>>>> * 1) A128GCM, SHA-256 >>>>>> >>>>>> * 2) A256GCM, SHA-384 >>>>>> >>>>>> * 3) ChaCha20/Poly1305, SHA-256 >>>>>> >>>>>> * 4) ChaCha20/Poly1305, SHAKE256 >>>>>> ... >>>>>> * 5) TLS_SHA256 >>>>>> >>>>>> * 6) TLS_SHA384 >>>>>> >>>>>> * 7) TLS_SHA512 >>>>>> >>>>>> Perhaps: >>>>>> * AES-CCM-16-64-128, SHA-256 (default) >>>>>> >>>>>> * A128GCM, SHA-256 >>>>>> >>>>>> * A256GCM, SHA-384 >>>>>> >>>>>> * ChaCha20/Poly1305, SHA-256 >>>>>> >>>>>> * ChaCha20/Poly1305, SHAKE256 >>>>>> ... >>>>>> * TLS_SHA256 >>>>>> >>>>>> * TLS_SHA384 >>>>>> >>>>>> * TLS_SHA512 >>>>>> >>>>>> --> >>>>>> >>>>>> >>>>> [Authors] The numbers on Sections 6.1 match the values in “9.1. CoAP-EAP >>>>> Cipher Suites”. >>>>> The numbers in Appendix A are the expected continuation of these, but are >>>>> not in the specification, and not in the IANA section. This text should >>>>> also solve issue 42 as well. >>>>> Suggested update text: >>>>> The following hash algorithms are considered in case the specification >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) >>>>> >>>>> >>>>>> 26) <!-- [rfced] Section 6.2: Does "Steps 7 and 8" here refer to >>>>>> Steps 7 and 8 in Figure 3? If yes, for ease of the reader we suggest >>>>>> adding a citation for Figure 3. >>>>>> >>>>>> Original: >>>>>> The derivation of the security context for OSCORE allows securing the >>>>>> communication between the EAP peer and the EAP authenticator once the >>>>>> MSK has been exported, providing confidentiality, integrity, key >>>>>> confirmation (Steps 7 and 8), and downgrading attack detection. --> >>>>>> >>>>>> >>>>> [Authors] Yes, we refer to Figure 3. >>>>> >>>>> >>>>>> 27) <!-- [rfced] Section 6.2: We clarified these sentences as noted >>>>>> below. If these updates are incorrect, please clarify "the cipher >>>>>> suite 0". >>>>>> >>>>>> Original: >>>>>> If CS-C or CS-I were not sent, (i.e., default algorithms are used) >>>>>> the value used to generate CS will be the same as if the default >>>>>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR >>>>>> array with the cipher suite 0). >>>>>> ... >>>>>> If CS-C or CS-I were not sent, (i.e., default algorithms are used) >>>>>> the value used to generate CS will be the same as if the default >>>>>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR >>>>>> array with the cipher suite 0). >>>>>> >>>>>> Currently: >>>>>> If neither CS-C nor CS-I was sent (i.e., default algorithms are >>>>>> used), the value used to generate CS will be the same as if the >>>>>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a >>>>>> CBOR array with the cipher suite value of 0). >>>>>> ... >>>>>> If neither CS-C nor CS-I was sent (i.e., default algorithms are >>>>>> used), the value used to generate CS will be the same as if the >>>>>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a >>>>>> CBOR array with the cipher suite value of 0). --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 28) <!-- [rfced] Please review instances of the term "NULL" as used in >>>>>> this >>>>>> document and let us know if any updates are needed. We believe that >>>>>> "NULL" should be updated to either "NUL" (that is, referring to the >>>>>> specific ASCII control code) or "null". --> >>>>>> >>>>>> >>>>> [Authors] We mean the same as the instance you can find in rfc5191 of >>>>> PANA page 16 >>>>> - "IETF PANA" is the ASCII code representation of the non-NULL terminated >>>>> string (excluding the double quotes around it). >>>>> >>>>> >>>>> >>>>>> 29) <!-- [rfced] Section 7.1: We changed this text as noted below. >>>>>> Please review carefully (including our expansion of "AVP" for ease of >>>>>> the reader), and let us know if anything is incorrect. >>>>>> >>>>>> Original: >>>>>> Note: When EAP >>>>>> is proxied over an AAA framework, the Access-Request packets in >>>>>> RADIUS MUST contain a Framed-MTU attribute with the value 1024, and >>>>>> the Framed-MTU AVP to 1024 in DIAMETER This attribute signals the AAA >>>>>> server that it should limit its responses to 1024 octets. >>>>>> >>>>>> Currently: >>>>>> Note: When EAP is proxied over a AAA framework, the >>>>>> Access-Request packets in RADIUS MUST contain a Framed-MTU >>>>>> attribute with a value of 1024 and, in Diameter, the Framed-MTU >>>>>> Attribute-Value Pair (AVP) with a value of 1024. This information >>>>>> signals the AAA server that it should limit its responses to 1024 >>>>>> octets. --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 30) <!-- [rfced] Section 7.2: This sentence is difficult to parse. If >>>>>> the suggested text is not correct, please rephrase "constrained >>>>>> devices and network scenarios" and "older versions with the goal of >>>>>> economization". >>>>>> >>>>>> Also, please review and let us know whether this "Note:" item that is >>>>>> set off in a separate paragraph should be in the <aside> element. >>>>>> <aside> is defined as "a container for content that is semantically >>>>>> less important or tangential to the content that surrounds it" >>>>>> (https://urldefense.com/v3/__https://authors.ietf.org/en/rfcxml-vocabulary*aside__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5DOBldVg$ >>>>>> ). >>>>>> >>>>>> Original: >>>>>> Note: For constrained devices and network scenarios, the use of the >>>>>> latest versions of EAP methods (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 >>>>>> [RFC9190]) is recommended in favor of older versions with the goal of >>>>>> economization, or EAP methods more adapted for IoT (e.g., EAP-NOOB >>>>>> [RFC9140], EAP-EDHOC [I-D.ietf-emu-eap-edhoc], etc.). >>>>>> >>>>>> Suggested: >>>>>> Note: To improve efficiency in environments with >>>>>> constrained devices and networks, the latest versions of EAP methods >>>>>> (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 [RFC9190]) are recommended over >>>>>> older versions. EAP methods more adapted for IoT networks (e.g., >>>>>> EAP-NOOB [RFC9140], EAP-EDHOC [EAP-EDHOC], etc.) are also >>>>>> recommended. --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 31) <!-- [rfced] Section 8.2: This sentence did not parse. We updated >>>>>> it as noted below. If this update is incorrect, please clarify >>>>>> "can be with the transport of SAML". >>>>>> >>>>>> Original: >>>>>> Providing more fine-grained >>>>>> authorization data can be with the transport of SAML in RADIUS >>>>>> [RFC7833]. >>>>>> >>>>>> Currently: >>>>>> Providing more fine-grained >>>>>> authorization data can be done by transporting the data using the >>>>>> Security Assertion Markup Language (SAML) in RADIUS [RFC7833]. --> >>>>>> >>>>>> >>>>> [Authors] Currently suggested text is ok. >>>>> >>>>>> 32) <!-- [rfced] Section 8.3: >>>>>> >>>>>> a) To what does "exclusively" refer in this sentence? If the >>>>>> suggested text is not correct, please clarify. >>>>>> >>>>>> Original (the previous sentence is included for context): >>>>>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP >>>>>> connectivity in the link between the EAP peer and the EAP >>>>>> authenticator to run. This link MUST authorize exclusively >>>>>> unprotected IP traffic to be sent between the EAP peer and the EAP >>>>>> authenticator during the authentication with CoAP-EAP. >>>>>> >>>>>> Suggested: >>>>>> This link MUST only authorize >>>>>> unprotected IP traffic to be sent between the EAP peer and the EAP >>>>>> authenticator during the authentication with CoAP-EAP. >>>>>> >>>>>> >>>>> [Authors] We mean that this link will only allow unprotected traffic >>>>> between the EAP peer and the EAP for the purpose of running CoAP-EAP. Any >>>>> other traffic should not be allowed. >>>>> >>>>> The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> b) This sentence did not parse. We updated it to make a complete >>>>>> sentence. Please review this update carefully; if it is incorrect, >>>>>> please clarify. >>>>>> >>>>>> Original: >>>>>> It is worth noting that if the EAP authenticator is not >>>>>> in the same link as the EAP peer and an intermediate entity helps >>>>>> with this process (i.e., CoAP proxy) and the same comment applies to >>>>>> the communication between the EAP peer and the intermediary. >>>>>> >>>>>> Currently: >>>>>> It is worth noting that if the EAP authenticator is not >>>>>> in the same link as the EAP peer and an intermediate entity (i.e., a >>>>>> CoAP proxy) helps with this process, this concept also applies to the >>>>>> communication between the EAP peer and the intermediary. --> >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>>> 33) <!-- [rfced] Section 8.5: Does "the document" refer to RFC 6677 or >>>>>> this document? Also, how may we update "(To be assigned by IANA)"? >>>>>> >>>>>> Original (the previous paragraph is included for context): >>>>>> According to the [RFC6677], channel binding, related to EAP, is sent >>>>>> through the EAP method supporting it. >>>>>> >>>>>> To satisfy the requirements of the document, the EAP lower layer >>>>>> identifier (To be assigned by IANA) needs to be sent, in the EAP >>>>>> Lower-Layer Attribute if RADIUS is used. >>>>>> >>>>>> Perhaps: >>>>>> To satisfy the requirements of this document, the EAP lower-layer >>>>>> identifier for CoAP-EAP (10) needs to be sent, in the EAP >>>>>> Lower-Layer Attribute if RADIUS is used. >>>>>> >>>>>> Or: >>>>>> To satisfy the requirements of this document, the EAP lower-layer >>>>>> identifier assigned by IANA (see Section 9.4) needs to be sent, in the >>>>>> EAP >>>>>> Lower-Layer Attribute if RADIUS is used. >>>>>> --> >>>>>> >>>>>> >>>>> [Authors] We believe the first proposal is ok >>>>> To satisfy the requirements of this document, the EAP lower-layer >>>>> identifier for CoAP-EAP (10) needs to be sent, in the EAP >>>>> Lower-Layer Attribute if RADIUS is used. >>>>> >>>>> >>>>> >>>>> >>>>>> 34) <!-- [rfced] Section 8.6: Does "Step 0" here refer to Step 0 in >>>>>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest >>>>>> adding a citation for the appropriate figure. >>>>>> >>>>>> Original: >>>>>> For instance, an attacker can forge >>>>>> multiple initial messages to start an authentication (Step 0) with >>>>>> the EAP authenticator as if they were sent by different EAP peers. --> >>>>>> >>>>>> >>>>> [Authors] we refer to Figure 3. >>>>> >>>>> >>>>> >>>>>> 35) <!-- [rfced] Sections 9.1 and 9.2: The name "CoAP-EAP protocol" for >>>>>> the new >>>>>> registry group reads oddly, as it means "Constrained Application >>>>>> Protocol-Extensible Authentication Protocol protocol". May we change the >>>>>> name of the new registry group to "CoAP-EAP"? >>>>>> >>>>>> If yes, we will ask IANA to update the registry group name on >>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/coap-eap.xhtml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6tPX02Xg$ >>>>>> >. >>>>>> (We could not find an existing IANA registry with the name "CoAP-EAP", >>>>>> so this name would be unique (but we would confirm this with IANA).) >>>>>> >>>>>> Original: >>>>>> IANA has created a new registry titled "CoAP-EAP Cipher Suites" under >>>>>> the new group name "CoAP-EAP protocol". >>>>>> ... >>>>>> IANA has created a new registry titled "CoAP-EAP Information element" >>>>>> under the new group name "CoAP-EAP protocol". --> >>>>>> >>>>>> >>>>> [Authors] The suggested changes are ok for us. >>>>> >>>>> >>>>> >>>>>> 36) <!-- [rfced] Section 9.2: Because there is no "Value" entity in the >>>>>> "CoAP-EAP Information Elements" registry, we changed "Value" to >>>>>> "Label" per >>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ >>>>>> >. If this is >>>>>> incorrect, please clarify the list of columns in the "CoAP-EAP >>>>>> Information Elements" registry. >>>>>> >>>>>> Original: >>>>>> The columns of the registry are Name, Label, CBOR Type, Description >>>>>> and Reference, where Value is an integer, and the other columns are >>>>>> text strings. >>>>>> >>>>>> Currently: >>>>>> The columns of the registry are Name, Label, CBOR Type, Description, >>>>>> and Reference, where Label is an integer and the other columns are >>>>>> text strings. --> >>>>>> >>>>>> >>>>> [Authors] The proposed text is correct. >>>>> >>>>> >>>>> >>>>>> 37) <!-- [rfced] [TS133.501]: We found a more recent version of this >>>>>> specification. Because it appears that EAP will continue to be >>>>>> mentioned in subsequent versions of this paper, may we update this >>>>>> listing as follows? >>>>>> >>>>>> Original: >>>>>> [TS133.501] >>>>>> ETSI, "5G; Security architecture and procedures for 5G >>>>>> System - TS 133 501 V15.2.0 (2018-10)", 2018. >>>>>> >>>>>> Suggested: >>>>>> [TS133.501] >>>>>> ETSI, "5G; Security architecture and procedures for 5G >>>>>> System - TS 133 501 V18.9.0", April 2025, >>>>>> https://urldefense.com/v3/__https://www.etsi.org/deliver/etsi_ts/133500_133599/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH47PGG_Jw$ >>>>>> 133501/18.09.00_60/ts_133501v180900p.pdf --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] The suggestion is ok and very welcome. Thank you. >>>>> >>>>> >>>>> >>>>>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number. >>>>>> We also found that >>>>>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$ >>>>>> > steers to >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >>>>>> >. When we searched >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ >>>>>> > for >>>>>> the number 095023r34, the result was "Nothing found, please try >>>>>> adjusting your search." >>>>>> >>>>>> Should a different paper be listed here and cited in Appendices B and >>>>>> C.5.1? >>>>>> >>>>>> Original: >>>>>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document >>>>>> 095023r34)", 2014. --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] Certainly, this seems to be an old reference. We have other >>>>> examples, the best course of action would be to remove this reference and >>>>> the associated text. >>>>> Forced removal can be done by sending new specific key material to the >>>>> devices that still belong to the network, excluding the removed device, >>>>> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP >>>>> [ZigbeeIP]. >>>>> – >>>>> Another example would be when a shared Network Key is required by the >>>>> devices that join a network. An example of this Network Key can be found >>>>> in Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD]. >>>>> >>>>> >>>>> >>>>> >>>>>> 39) <!-- [rfced] We found a newer version (1.4.0) of the Thread >>>>>> specification. As the citation in Appendix B is general in nature, >>>>>> may we update this listing as suggested below? >>>>>> >>>>>> Original: >>>>>> [THREAD] Thread Group, "Thread specification 1.3", 2023. >>>>>> >>>>>> Suggested: >>>>>> [THREAD] Kumar, S. and E. Dijk, "Thread 1.4 Features White Paper", >>>>>> September 2024, >>>>>> <https://urldefense.com/v3/__https://www.threadgroup.org/Portals/0/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7aZUQuhA$ >>>>>> Documents/ >>>>>> Thread_1.4_Features_White_Paper_September_2024.pdf>. --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] The suggestion is ok and welcome. Thank you. >>>>> >>>>> >>>>> >>>>>> 40) <!-- [rfced] Figure 9: >>>>>> >>>>>> a) Please note that we changed "hanshake" to "handshake". However, >>>>>> in the HTML and PDF output files, the space after the "e" in >>>>>> "hanshake" was removed in the process. We cannot determine where in >>>>>> the SVG a coordinate should be modified to correct the spacing. >>>>>> Please correct the SVG in the edited copy of the XML. >>>>>> >>>>>> b) We see "down" arrows between MSK and DTLS_PSK in the ASCII art >>>>>> for this figure, but they do not appear in the SVG. If you would >>>>>> like to add the arrows in the SVG, please correct the SVG in the >>>>>> edited copy of the XML. >>>>>> >>>>>> c) We see "(Protected with (D)TLS)" in the ASCII art but >>>>>> "Protected with (D)TLS" in the SVG. If you prefer the parentheses, >>>>>> please correct the SVG in the edited copy of the XML. If you prefer >>>>>> that the parentheses be removed, let us know, and we will update the >>>>>> ASCII art accordingly. --> >>>>>> >>>>>> >>>>> [Authors] New figure in rfc9820_modified.xml solves these issues. >>>>> Also, for consistency, in Figure 3 there were no arrows indicating key >>>>> derivation, we also updated that Figure in the xml file. >>>>> >>>>> >>>>> >>>>>> 41) <!-- [rfced] Appendix A: >>>>>> >>>>>> a) As it appears that "Steps 1 and 2" here refer to Steps 1 and 2 in >>>>>> Figure 8 (as opposed to Steps 1 and 2 in Figure 3), may we add a >>>>>> citation for Figure 8 for ease of the reader? >>>>>> >>>>>> If the suggested text is not correct, please also clarify "if DTLS >>>>>> wants to be used". >>>>>> >>>>>> Original: >>>>>> To simplify the design in CoAP-EAP, the KDF hash algorithm >>>>>> can be included in the list of cipher suites exchanged in Step 1 and >>>>>> Step 2 if DTLS wants to be used instead of OSCORE. >>>>>> >>>>>> Suggested: >>>>>> To simplify the design in CoAP-EAP, the KDF hash algorithm >>>>>> can be included in the list of cipher suites exchanged in Steps 1 and >>>>>> 2 (Figure 8) if one wants to use DTLS instead of OSCORE. >>>>>> >>>>>> >>>>> [Authors] The suggested text is ok. >>>>> >>>>> >>>>> >>>>>> b) Should "(RID-C) (RID-I)" be "RID-C || RID-I" per Appendix A.1? >>>>>> >>>>>> Original: >>>>>> For the same >>>>>> reason, the PSK identity is derived from (RID-C) (RID-I) as defined >>>>>> in Appendix A.1. --> >>>>>> >>>>>> >>>>> [Authors] Yes, this is correct. "(RID-C) (RID-I)" should be "RID-C || >>>>> RID-I" >>>>> >>>>> >>>>> >>>>>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this >>>>>> sentence, along the lines of "The other supported and negotiated >>>>>> cipher suites are the following" as seen in Section 6.1? >>>>>> >>>>>> Original: >>>>>> The hash algorithms considered are the following: >>>>>> >>>>>> * 5) TLS_SHA256 >>>>>> >>>>>> * 6) TLS_SHA384 >>>>>> >>>>>> * 7) TLS_SHA512 >>>>>> >>>>>> Possibly: >>>>>> The following hash algorithms are supported: >>>>>> >>>>>> * 5) TLS_SHA256 >>>>>> >>>>>> * 6) TLS_SHA384 >>>>>> >>>>>> * 7) TLS_SHA512 --> >>>>>> >>>>>> >>>>> [Authors] Following the previous issue (point 25) >>>>> Proposed text. >>>>> The following hash algorithms are considered in case the specification >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) >>>>> >>>>> >>>>> >>>>>> 43) <!-- [rfced] Appendix A.1: Because the other equations in this >>>>>> document don't end in periods, we removed the period from the end of >>>>>> this equation. Please let us know any concerns. >>>>>> >>>>>> Original: >>>>>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length). >>>>>> >>>>>> Currently: >>>>>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length) --> >>>>>> >>>>>> >>>>> [Authors] The current proposed correction is ok. >>>>> >>>>> >>>>> >>>>>> 44) <!-- [rfced] Appendix B: Because "PSK" stands for "Pre-Shared Key", >>>>>> should "a shared key PSK" be "a PSK"? >>>>>> >>>>>> Original: >>>>>> Similarly, to the example of Appendix A.1, where a shared key PSK for >>>>>> DTLS is derived, it is possible to provide key material to different >>>>>> link-layers after the CoAP-EAP authentication is complete. --> >>>>>> >>>>>> >>>>> [Authors] You are correct. "a shared key PSK" should be "a PSK" >>>>> >>>>> >>>>> >>>>>> 45) <!-- [rfced] Appendix B: This sentence was difficult to follow. >>>>>> We updated it as noted below. If this is incorrect, please clarify >>>>>> the text. >>>>>> >>>>>> Original: >>>>>> How a particular link-layer technology uses the MSK to derive further >>>>>> key material for protecting the link-layer or use the OSCORE >>>>>> protection to distribute key material is out of the scope of this >>>>>> document. >>>>>> >>>>>> Currently (changed "uses the MSK ... or use the OSCORE protection" to >>>>>> "uses the MSK ... or uses OSCORE protection"): >>>>>> How a particular link-layer technology uses the MSK to derive further >>>>>> key material for protecting the link layer or uses OSCORE protection >>>>>> to distribute key material is outside the scope of this document. --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 46) <!-- [rfced] Appendix C: "EAP peers (A and B), which are EAP peers. >>>>>> They are the EAP peers." appeared to be some unintentionally repeated >>>>>> text. We removed the extra text as noted below. If some additional >>>>>> information for this bullet item was intended (for example, as was >>>>>> done for the "EAP authenticator (C)" and "AAA server (AAA)" bullet >>>>>> items), please provide the information. >>>>>> >>>>>> Original: >>>>>> * 2 EAP peers (A and B), which are EAP peers. They are the EAP >>>>>> peers. >>>>>> >>>>>> Currently: >>>>>> * Two EAP peers (A and B). --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 47) <!-- [rfced] Appendix C: "the EAP authenticator acts as an EAP >>>>>> authenticator" read oddly and was difficult to follow. We updated >>>>>> this sentence as noted below. If this update is incorrect, please >>>>>> clarify the text. >>>>>> >>>>>> Original: >>>>>> Here, the EAP authenticator acts as an EAP authenticator in pass- >>>>>> through mode. >>>>>> >>>>>> Currently: >>>>>> Here, the EAP authenticator is operating in pass- >>>>>> through mode. --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 48) <!-- [rfced] Appendix C: This sentence did not parse. We updated it >>>>>> as noted below. If this is incorrect, please clarify "... methods >>>>>> might need to be used (...) being able to ...". >>>>>> >>>>>> Original: >>>>>> With varied EAP peers and >>>>>> networks, more lightweight authentication methods might need to be >>>>>> used (e.g., EAP-NOOB[RFC9140], EAP-AKA'[RFC5448], EAP-PSK[RFC4764], >>>>>> EAP-EDHOC[I-D.ietf-emu-eap-edhoc], etc.) being able to adapt to >>>>>> different types of devices according to organization policies or >>>>>> devices capabilities. >>>>>> >>>>>> Currently: >>>>>> With varied EAP peers and >>>>>> networks, authentication methods that are more lightweight (e.g., >>>>>> EAP-NOOB [RFC9140], EAP-AKA' [RFC5448], EAP-PSK [RFC4764], EAP-EDHOC >>>>>> [EAP-EDHOC], etc.) and are able to adapt to different types of >>>>>> devices according to organization policies or device capabilities >>>>>> might need to be used. --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>> >>>>> >>>>>> 49) <!-- [rfced] Appendix C.1: Does "while" in this sentence mean "at >>>>>> the same time as" or "as long as" (per the "as long as the key >>>>>> material is still valid" phrase in the "It is worth noting that the >>>>>> first phase ..." paragraph)? >>>>>> >>>>>> Original: >>>>>> This access can be repeated without contacting the EAP >>>>>> authenticator, while the credentials given to A are still valid. --> >>>>>> >>>>>> >>>>> [Authors] It means "as long as". >>>>> >>>>> >>>>> >>>>>> 50) <!-- [rfced] Appendix C.1: We had trouble following the meaning of >>>>>> "the first phase with CoAP-EAP". If the suggested text is not >>>>>> correct, please provide clarifying text. >>>>>> >>>>>> Original: >>>>>> It is worth noting that the first phase with CoAP-EAP is required to >>>>>> join the EAP authenticator C's domain. >>>>>> >>>>>> Suggested: >>>>>> It is worth noting that to join EAP authenticator C's domain, the >>>>>> first phase (authentication via CoAP-EAP) is required. --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>>> 51) <!-- [rfced] Appendix C.2: >>>>>> >>>>>> a) Should "AKA" be "AKA'", as used elsewhere in this document? >>>>>> >>>>>> Original: >>>>>> A device (A) of the domain acme.org, which uses a specific kind of >>>>>> credential (e.g., AKA) and intends to join the um.es domain. >>>>>> >>>>>> >>>>> [Authors] This clarification adds more confusion than without it. Please >>>>> leave it as follows >>>>> >>>>> A device (A) of the domain acme.org, which uses a specific kind of >>>>> credential (e.g., AKA) and intends to join the um.es domain. >>>>> >>>>> >>>>>> b) This sentence does not parse. It appears that some words are >>>>>> missing. Please clarify "Through the local AAA server communicate >>>>>> with the home AAA server ...". >>>>>> >>>>>> Original: >>>>>> Through the local AAA server >>>>>> communicate with the home AAA server to complete the authentication >>>>>> and integrate the device as a trustworthy entity into the domain of >>>>>> EAP authenticator C. --> >>>>>> >>>>>> >>>>> [Authors]The text hopefully is clearer as follows: >>>>> Then, the local AAA server communicates with the home AAA server to >>>>> complete the authentication. This way, the device can be considered as a >>>>> trustworthy entity within the domain of the EAP authenticator C >>>>> >>>>> >>>>> >>>>>> 52) <!-- [rfced] Appendix C.5.1: We corrected the incomplete >>>>>> "Where can ..." sentence as follows. If this change is not correct, >>>>>> please provide clarifying text. >>>>>> >>>>>> Original (the previous sentence is included for context): >>>>>> For >>>>>> example, in IEEE 802.15.4 networks, a new KMP ID can be defined to >>>>>> add such support in the case of IEEE 802.15.9 [ieee802159]. Where >>>>>> can be assumed that the device has at least a link-layer IPv6 >>>>>> address. >>>>>> >>>>>> Currently (now one sentence that includes the expansion for "KMP"): >>>>>> For >>>>>> example, in IEEE 802.15.4 networks, a new Key Management Protocol >>>>>> (KMP) ID can be defined to add such support in the case of IEEE >>>>>> 802.15.9 [IEEE802159], where it can be assumed that the device has at >>>>>> least a link-layer IPv6 address. --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 53) <!-- [rfced] Appendix C.5.1: Per the phrase "entity (proxy) that is >>>>>> already part of the network (already shares key material and >>>>>> communicates through a secure channel with the authenticator)" in the >>>>>> next paragraph of this section and per Figure 10, we updated this >>>>>> sentence accordingly. If this is incorrect, please clarify what >>>>>> communicates through a secure channel. >>>>>> >>>>>> Original: >>>>>> In the case a proxy participates in CoAP- >>>>>> EAP, it will be because it is already a trustworthy entity within the >>>>>> domain, which communicates through a secure channel with the EAP >>>>>> authenticator, as illustrated by Figure 10. >>>>>> >>>>>> Currently: >>>>>> In the case that a proxy participates in >>>>>> CoAP-EAP, it will be because it is already a trustworthy entity >>>>>> within the domain and communicates through a secure channel with the >>>>>> EAP authenticator, as illustrated by Figure 10. --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. >>>>> >>>>> >>>>> >>>>>> 54) <!-- [rfced] Appendix C.5.1: This paragraph had several issues: >>>>>> This section (Appendix C.5.1) cited itself, and in the second >>>>>> sentence, "As mentioned, either ..." was unclear. Also, the >>>>>> second sentence was incomplete. Please review all of our updates >>>>>> carefully, and let us know if anything is incorrect. >>>>>> >>>>>> (Side note: We cited Section 3.6 here because although Section 3.1 >>>>>> mentions both direct links and linking via a proxy, it doesn't >>>>>> provide any descriptive text.) >>>>>> >>>>>> Original: >>>>>> Thus, the EAP peer follows the same process described in >>>>>> Appendix C.5.1 to perform the authentication. As mentioned, either >>>>>> with a direct link to the EAP authenticator, or through an >>>>>> intermediary entity (proxy) that is already part of the network >>>>>> (already shares key material and communicates through a secure >>>>>> channel with the authenticator) and can aid in running CoAP-EAP. >>>>>> >>>>>> Currently (the direct connection is mentioned in the previous >>>>>> paragraph, so we did not mention it again here): >>>>>> If the EAP peer cannot connect to the EAP authenticator directly, >>>>>> the EAP peer can follow the same process as that described in >>>>>> Section 3.6 to perform the authentication (i.e., can connect via >>>>>> an intermediary entity (proxy) that is already part of the network >>>>>> (already shares key material and communicates through a secure >>>>>> channel with the authenticator) and can aid in running CoAP-EAP). --> >>>>>> >>>>>> >>>>> [Authors] The currently suggested text is ok. The only change would be to >>>>> set proxy as example. >>>>> … an intermediary entity (e.g., proxy) that is already part of the network >>>>> >>>>> >>>>> >>>>>> 55) <!-- [rfced] Figure 10: We see "(security association)" in the ASCII >>>>>> art but "security association" in the SVG. If you prefer the >>>>>> parentheses, please correct the SVG in the edited copy of the XML. >>>>>> If you prefer that the parentheses be removed, let us know, and we >>>>>> will update the ASCII art accordingly. --> >>>>>> >>>>>> >>>>> [Authors] it is ok without parenthesis. >>>>> >>>>> >>>>> >>>>>> 56) <!-- [rfced] Please review the "Inclusive Language" portion of >>>>>> the online Style Guide at >>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7Wcxz1GQ$ >>>>>> >, >>>>>> and let us know if any changes are needed. Updates of this nature >>>>>> typically result in more precise language, which is helpful for >>>>>> readers. >>>>>> >>>>>> For example, please consider whether the following should be updated: >>>>>> Master Session Key, Master Secret, Master Salt, Master Key --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] These are the same terms used in the EAP [RFC] standard and >>>>> OSCORE standard [RFC] from which this work depends. It is needed to >>>>> understand the terminology to which we refer. >>>>> >>>>> >>>>>> 57) <!-- [rfced] Please let us know if any changes are needed for the >>>>>> following: >>>>>> >>>>>> a) The following terms were used inconsistently in this document. >>>>>> We chose to use the latter forms. Please let us know any objections. >>>>>> >>>>>> AAA Server / AAA server (per post-6000 published RFCs) >>>>>> >>>>>> >>>>> [AUTHORS] AAA server >>>>> >>>>>> Client registration (in running text) / >>>>>> client registration (per RFC 9200) >>>>>> >>>>>> >>>>> [AUTHORS] client registration >>>>> >>>>>> b) The following terms appear to be used inconsistently in this >>>>>> document. Please let us know which form is preferred. >>>>>> >>>>>> "a/eap/1" (the URI for the first resource would be "a/eap/1") / >>>>>> '/a/eap/1' >>>>>> >>>>>> >>>>> [AUTHORS] "a/eap/1" >>>>> >>>>>> CBOR Object / CBOR object >>>>>> >>>>> [AUTHORS] CBOR Object >>>>> >>>>>> DTLS PSK / DTLS_PSK >>>>>> >>>>> [AUTHORS] DTLS_PSK >>>>> >>>>>> EAP Failure / EAP failure >>>>>> (will send an EAP Failure, sends an EAP failure) >>>>>> >>>>>> >>>>> [AUTHORS] EAP Failure >>>>> >>>>>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id >>>>>> >>>>>> >>>>> [AUTHORS] EAP-Request/Identity >>>>> >>>>> >>>>>> EAP response / EAP Response (used generally in text, e.g., >>>>>> "an EAP response", "an EAP Response") >>>>>> (We also see "EAP Response header" in Section 7.1.) >>>>>> >>>>>> >>>>> [AUTHORS] EAP Response >>>>> >>>>> >>>>> >>>>>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id >>>>>> >>>>>> >>>>> [AUTHORS] EAP-Response/Identity >>>>> >>>>> >>>>> >>>>>> EAP-X-Req (text) / EAP-X Req (Figure 3) >>>>>> >>>>>> >>>>> [AUTHORS] EAP-X-Req >>>>> We updated the figures so they are consistent >>>>> >>>>>> EAP-X-Resp (text) / EAP-X Resp (Figures 3 and 9) >>>>>> >>>>>> >>>>> [AUTHORS] EAP-X-Resp >>>>> >>>>> >>>>> >>>>>> Network Key / network key >>>>>> >>>>>> >>>>> [AUTHORS] Network Key >>>>> >>>>> >>>>> >>>>>> Option(s) / option(s) (e.g., "Location-Path Option", >>>>>> "Location-Path and/or Location-Query Options", >>>>>> "Location-Path or Location-Query options", >>>>>> "Location-Path (and/or Location-Query) Options", >>>>>> "Location-Path (and/or Location-Query) options") >>>>>> >>>>>> >>>>> [AUTHORS] Option(s) >>>>> >>>>>> OSCORE Security Context / OSCORE security context >>>>>> >>>>>> >>>>> [AUTHORS] OSCORE Security Context >>>>> >>>>> >>>>>> Session-Lifetime / Session-lifetime / Session Lifetime / >>>>>> session lifetime (in running text) >>>>>> (Figure 3 and Table 4 use "Session-Lifetime".) >>>>>> >>>>>> >>>>> [AUTHORS] Session-Lifetime >>>>> >>>>> >>>>> >>>>>> c) Should quoting and spacing be made consistent? For example: >>>>>> >>>>>> Quoting: '2.01 Created' / "2.01 Created" >>>>>> >>>>> [Authors] ‘2.01 Created’ >>>>> >>>>>> Spacing: Payload(EAP-X Resp) / Payload (EAP-X Resp) >>>>>> >>>>> [Authors] without spacing between be parenthesis >>>>> >>>>>> d) Should spacing after step numbers in figures be made >>>>>> consistent? For example: >>>>>> >>>>>> ... >>>>>> 0)| No-Response | >>>>>> ... (Figure 3) >>>>>> >>>>>> ... >>>>>> 0) | No-Response | >>>>>> ... (Figure 5) --> >>>>>> >>>>>> >>>>>> >>>>> [Authors] Without spacing is ok. >>>>> >>>>> >>>>>> Thank you. >>>>>> >>>>>> RFC Editor/lb/rv >>>>>> >>>>>> >>>>> Thank you very much. >>>>> >>>>> >>>>>> On Jul 18, 2025, at 10:46 AM, rfc-edi...@rfc-editor.org wrote: >>>>>> >>>>>> *****IMPORTANT***** >>>>>> >>>>>> Updated 2025/07/18 >>>>>> >>>>>> RFC Author(s): >>>>>> -------------- >>>>>> >>>>>> Instructions for Completing AUTH48 >>>>>> >>>>>> Your document has now entered AUTH48. Once it has been reviewed and >>>>>> approved by you and all coauthors, it will be published as an RFC. >>>>>> If an author is no longer available, there are several remedies >>>>>> available as listed in the FAQ >>>>>> (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4mckAP4A$ >>>>>> ). >>>>>> >>>>>> You and you coauthors are responsible for engaging other parties >>>>>> (e.g., Contributors or Working Group) as necessary before providing >>>>>> your approval. >>>>>> >>>>>> Planning your review >>>>>> --------------------- >>>>>> >>>>>> Please review the following aspects of your document: >>>>>> >>>>>> * RFC Editor questions >>>>>> >>>>>> Please review and resolve any questions raised by the RFC Editor >>>>>> that have been included in the XML file as comments marked as >>>>>> follows: >>>>>> >>>>>> <!-- [rfced] ... --> >>>>>> >>>>>> These questions will also be sent in a subsequent email. >>>>>> >>>>>> * Changes submitted by coauthors >>>>>> >>>>>> Please ensure that you review any changes submitted by your >>>>>> coauthors. We assume that if you do not speak up that you >>>>>> agree to changes submitted by your coauthors. >>>>>> >>>>>> * Content >>>>>> >>>>>> Please review the full content of the document, as this cannot >>>>>> change once the RFC is published. Please pay particular attention to: >>>>>> - IANA considerations updates (if applicable) >>>>>> - contact information >>>>>> - references >>>>>> >>>>>> * Copyright notices and legends >>>>>> >>>>>> Please review the copyright notice and legends as defined in >>>>>> RFC 5378 and the Trust Legal Provisions >>>>>> (TLP – >>>>>> https://urldefense.com/v3/__https://trustee.ietf.org/license-info__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5D1hB7LA$ >>>>>> ). >>>>>> >>>>>> * Semantic markup >>>>>> >>>>>> Please review the markup in the XML file to ensure that elements of >>>>>> content are correctly tagged. For example, ensure that <sourcecode> >>>>>> and <artwork> are set correctly. See details at >>>>>> <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4qmIsbLQ$ >>>>>> >. >>>>>> >>>>>> * Formatted output >>>>>> >>>>>> Please review the PDF, HTML, and TXT files to ensure that the >>>>>> formatted output, as generated from the markup in the XML file, is >>>>>> reasonable. Please note that the TXT will have formatting >>>>>> limitations compared to the PDF and HTML. >>>>>> >>>>>> >>>>>> Submitting changes >>>>>> ------------------ >>>>>> >>>>>> To submit changes, please reply to this email using ‘REPLY ALL’ as all >>>>>> the parties CCed on this message need to see your changes. The parties >>>>>> include: >>>>>> >>>>>> * your coauthors >>>>>> >>>>>> * rfc-edi...@rfc-editor.org (the RPC team) >>>>>> >>>>>> * other document participants, depending on the stream (e.g., >>>>>> IETF Stream participants are your working group chairs, the >>>>>> responsible ADs, and the document shepherd). >>>>>> >>>>>> * auth48archive@rfc-editor.org, which is a new archival mailing list >>>>>> to preserve AUTH48 conversations; it is not an active discussion >>>>>> list: >>>>>> >>>>>> * More info: >>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH73FBctPw$ >>>>>> >>>>>> * The archive itself: >>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5RDfiTDg$ >>>>>> >>>>>> * Note: If only absolutely necessary, you may temporarily opt out >>>>>> of the archiving of messages (e.g., to discuss a sensitive matter). >>>>>> If needed, please add a note at the top of the message that you >>>>>> have dropped the address. When the discussion is concluded, >>>>>> auth48archive@rfc-editor.org will be re-added to the CC list and >>>>>> its addition will be noted at the top of the message. >>>>>> >>>>>> You may submit your changes in one of two ways: >>>>>> >>>>>> An update to the provided XML file >>>>>> — OR — >>>>>> An explicit list of changes in this format >>>>>> >>>>>> Section # (or indicate Global) >>>>>> >>>>>> OLD: >>>>>> old text >>>>>> >>>>>> NEW: >>>>>> new text >>>>>> >>>>>> You do not need to reply with both an updated XML file and an explicit >>>>>> list of changes, as either form is sufficient. >>>>>> >>>>>> We will ask a stream manager to review and approve any changes that seem >>>>>> beyond editorial in nature, e.g., addition of new text, deletion of text, >>>>>> and technical changes. Information about stream managers can be found in >>>>>> the FAQ. Editorial changes do not require approval from a stream manager. >>>>>> >>>>>> >>>>>> Approving for publication >>>>>> -------------------------- >>>>>> >>>>>> To approve your RFC for publication, please reply to this email stating >>>>>> that you approve this RFC for publication. Please use ‘REPLY ALL’, >>>>>> as all the parties CCed on this message need to see your approval. >>>>>> >>>>>> >>>>>> Files >>>>>> ----- >>>>>> >>>>>> The files are available here: >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH61uj9KFA$ >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH46vzPMGQ$ >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4VnhbREw$ >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7CGA_kaw$ >>>>>> >>>>>> Diff file of the text: >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6IAS29qA$ >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6sl8fsTg$ >>>>>> (side by side) >>>>>> >>>>>> Diff of the XML: >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6VqyXnzw$ >>>>>> >>>>>> >>>>>> Tracking progress >>>>>> ----------------- >>>>>> >>>>>> The details of the AUTH48 status of your document are here: >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9820__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH41wCjt6w$ >>>>>> >>>>>> Please let us know if you have any questions. >>>>>> >>>>>> Thank you for your cooperation, >>>>>> >>>>>> RFC Editor >>>>>> >>>>>> -------------------------------------- >>>>>> RFC9820 (draft-ietf-ace-wg-coap-eap-15) >>>>>> >>>>>> Title : EAP-based Authentication Service for CoAP >>>>>> Author(s) : R. Marin-Lopez, D. Garcia-Carrillo >>>>>> WG Chair(s) : Loganaden Velvindron, Tim Hollebeek >>>>>> >>>>>> Area Director(s) : Deb Cooley, Paul Wouters >>>>>> >>>>>> >>>>>> >>>>>> >>>>> -- >>>>> Dan García Carrillo >>>>> --------------------- >>>>> Associate Professor >>>>> Dpto. de Informática, Área de Telemática, Universidad de Oviedo >>>>> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón >>>>> Dpcho. 2.7.8 - Edificio Polivalente >>>>> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es >>>>> <rfc9820_modified.xml> >>>>> >>> -- >>> Dan García Carrillo >>> --------------------- >>> Associate Professor >>> Dpto. de Informática, Área de Telemática, Universidad de Oviedo >>> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón >>> Dpcho. 2.7.8 - Edificio Polivalente >>> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org