Hi, Paul. So noted: https://www.rfc-editor.org/auth48/rfc9820
Thank you! RFC Editor/lb > On Aug 13, 2025, at 11:42 AM, Paul Wouters <paul.wout...@aiven.io> wrote: > > approved > > Paul > > On Wed, Aug 13, 2025 at 11:50 AM Lynne Bartholomew > <lbartholo...@staff.rfc-editor.org> wrote: > Dear Dan and *AD (Paul), > > Dan, thank you for your prompt reply! We have added the missing slash and > posted the latest files. > > * Paul, please review the item below, and let us know if you approve: > > > 1) <!-- [rfced] *AD, text was added to the Acknowledgments section after the > > document was approved for publication. Please review the changes, and > > let us know if you approve. > > > > Diff between v14 and v15: > > https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15 --> > > > The latest files are posted here. Please refresh your browser: > > https://www.rfc-editor.org/authors/rfc9820.txt > https://www.rfc-editor.org/authors/rfc9820.pdf > https://www.rfc-editor.org/authors/rfc9820.html > https://www.rfc-editor.org/authors/rfc9820.xml > https://www.rfc-editor.org/authors/rfc9820-diff.html > https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html (side by side) > https://www.rfc-editor.org/authors/rfc9820-auth48diff.html > https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html (side by > side) > https://www.rfc-editor.org/authors/rfc9820-lastdiff.html > https://www.rfc-editor.org/authors/rfc9820-lastrfcdiff.html (side by side) > > https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html > https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html > > Thanks again! > > RFC Editor/lb > > > > On Aug 13, 2025, at 5:47 AM, Dan Garcia Carrillo <garcia...@uniovi.es> > > wrote: > > > > Dear RFC Editor, > > > > Please, see answer inline. > > > > > > El 12/8/25 a las 19:34, Lynne Bartholomew escribió: > >> Dear Dan, > >> > >> Thank you very much for your responses to our additional questions. > >> > >> This item is still pending: > >> > >>>> Also, please confirm that the single instance of "a/eap/1" is correct > >>>> (i.e., "would be "a/eap/1" should not be "would be /a/eap/1"). > >> > >> Should the single instance of "a/eap/1" be "/a/eap/1"? In other words, is > >> it correct that this one instance does not include a slash before the "a"? > >> We ask because of the entries we see in Figure 3. > >> > >> Currently: > >> So, per Figure 3, the URI for the first resource would be "a/eap/1". > >> > >> = = = = = > > > > > > [Authors] It is missing the /. So, it would be > > > > So, per Figure 3, the URI for the first resource would be "/a/eap/1". > > > > Thank you. > > > > Best regards, > > > > Dan. > > > > > >> The latest files are posted here. Please refresh your browser: > >> > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-c7PkfZW$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-XVrunA0$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-fsUaGv7$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-TpW5UJZ$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-VoOjY-R$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-Tgq0UBI$ > >> (side by side) > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48diff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-VICEum7$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-Rfie6Ux$ > >> (side by side) > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-lastdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-TXoId9x$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-lastrfcdiff.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-YbcEQdR$ > >> (side by side) > >> > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-R7GbhlI$ > >> > >> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-X18OhGE$ > >> > >> Thanks again! > >> > >> RFC Editor/lb > >> > >> > >>> On Aug 8, 2025, at 3:39 AM, Dan Garcia Carrillo <garcia...@uniovi.es> > >>> wrote: > >>> > >>> Dear RFC Editor, > >>> Please see responses inline. > >>> El 4/8/25 a las 21:02, Lynne Bartholomew escribió: > >>>> [You don't often get email from lbartholo...@staff.rfc-editor.org. Learn > >>>> why this is important at > >>>> https://urldefense.com/v3/__https://aka.ms/LearnAboutSenderIdentification__;!!D9dNQwwGXtA!SZQDUX0GnyaAQikfXmG6ZSZKDBfSBWd7o00UKLtavSWcoUoLjpxOR05XCXbkjfoo9r2Wmc9-wuyl3aTi0R5zxCke-eZaWWpJ$ > >>>> ] > >>>> > >>>> Dear Dan, > >>>> > >>>> Thank you very much for the updated XML file and answers to our > >>>> questions! > >>>> > >>>> We have some follow-up items for you. Please let us know how this > >>>> document should be further updated. > >>>> > >>>> = = = = = > >>>> > >>>> * Please note that per post-6000 published RFCs (except for RFC 8995), > >>>> we changed '4.04 Not found' to '4.04 Not Found'. Please let us know any > >>>> objections. > >>>> > >>> [AUTHORS] No objections to the update. > >>> > >>>> = = = = = > >>>> > >>>> * Regarding our question 13) and your reply: As it appears that > >>>> "Finally, sends" means "Finally, the CoAP-EAP application sends", per > >>>> your note that the CoAP-EAP application takes control, we updated the > >>>> "Step 2" text accordingly. If this is incorrect, please clarify the > >>>> "Finally, sends" sentence. > >>>> > >>> [AUTHORS] No objections to the text update. Yes, it is the CoAP-EAP > >>> application. > >>> > >>> > >>>>>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the > >>>>>> EAP peer or the EAP peer state machine? If the suggested text is not > >>>>>> correct, please provide clarifying text. > >>>>>> > >>>>>> Original (previous text is included for context): > >>>>>> * Step 2. The EAP peer processes the POST message sending the EAP > >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns > >>>>>> an EAP response (EAP Resp/Id). Then, assigns a new resource to > >>>>>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes > >>>>>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created' > >>>>>> response with the new resource identifier in the Location-Path > >>>>>> (and/or Location-Query) options for the next step. > >>>>>> > >>>>>> Suggested (guessing the EAP peer state machine): > >>>>>> * Step 2. The EAP peer processes the POST message, sending the EAP > >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns > >>>>>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine > >>>>>> assigns a new resource to the ongoing authentication process > >>>>>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1'). > >>>>>> Finally, the EAP peer state machine sends a '2.01 Created' > >>>>>> response with the new resource identifier in the Location-Path > >>>>>> (and/or Location-Query) options for the next step. --> > >>>>>> > >>>>>> > >>>>> [Authors] We believe the best way to specify this is to differentiate > >>>>> between "EAP peer state machine" and the CoAP-EAP application of the > >>>>> EAP peer. > >>>>> The EAP peer state machine only deals with EAP messages. Processes EAP > >>>>> requests and returns an EAP response. > >>>>> With that, the CoAP-EAP application within the EAP peer takes control > >>>>> and manages everything CoAP related. Assigns a new resource to the > >>>>> ongoing authentication process (e.g., '/a/eap/2') and deletes the > >>>>> previous one ('/a/eap/1') > >>>>> So, a suggested new text. > >>>>> Step 2. The EAP peer processes the POST message sending the EAP > >>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns > >>>>> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application > >>>>> assigns a new resource to the ongoing authentication process > >>>>> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1'). > >>>>> Finally, sends a '2.01 Created'response with the new resource > >>>>> identifier in the Location-Path (and/or Location-Query) options > >>>>> for the next step. > >>>>> > >>>>> > >>>> = = = = = > >>>> > >>>> * Regarding our question 25) and your reply: Because of the preceding > >>>> sentence ("The other supported and negotiated cipher suites are as > >>>> follows:"), it was not clear to us how best to update this text. Please > >>>> review our update, and let us know if anything is incorrect: > >>>> > >>> [AUTHORS] No objections to the text update. > >>> > >>> > >>>>>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need > >>>>>> to be numbered? If yes, will this numbering scheme be clear to > >>>>>> readers? > >>>>>> > >>>>>> Original: > >>>>>> * 0) AES-CCM-16-64-128, SHA-256 (default) > >>>>>> > >>>>>> * 1) A128GCM, SHA-256 > >>>>>> > >>>>>> * 2) A256GCM, SHA-384 > >>>>>> > >>>>>> * 3) ChaCha20/Poly1305, SHA-256 > >>>>>> > >>>>>> * 4) ChaCha20/Poly1305, SHAKE256 > >>>>>> ... > >>>>>> * 5) TLS_SHA256 > >>>>>> > >>>>>> * 6) TLS_SHA384 > >>>>>> > >>>>>> * 7) TLS_SHA512 > >>>>>> > >>>>>> Perhaps: > >>>>>> * AES-CCM-16-64-128, SHA-256 (default) > >>>>>> > >>>>>> * A128GCM, SHA-256 > >>>>>> > >>>>>> * A256GCM, SHA-384 > >>>>>> > >>>>>> * ChaCha20/Poly1305, SHA-256 > >>>>>> > >>>>>> * ChaCha20/Poly1305, SHAKE256 > >>>>>> ... > >>>>>> * TLS_SHA256 > >>>>>> > >>>>>> * TLS_SHA384 > >>>>>> > >>>>>> * TLS_SHA512 > >>>>>> > >>>>>> --> > >>>>>> > >>>>>> > >>>>> [Authors] The numbers on Sections 6.1 match the values in “9.1. > >>>>> CoAP-EAP Cipher Suites”. > >>>>> The numbers in Appendix A are the expected continuation of these, but > >>>>> are not in the specification, and not in the IANA section. This text > >>>>> should also solve issue 42 as well. > >>>>> Suggested update text: > >>>>> The following hash algorithms are considered in case the specification > >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) > >>>>> > >>>> = = = = = > >>>> > >>>> * Regarding our question 38) and your reply: Please review our updates > >>>> related to the removal of the Zigbee reference, and let us know if > >>>> anything is incorrect. > >>>> > >>>> > >>> [AUTHORS] No objections to the text update. > >>> > >>> > >>>>>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number. > >>>>>> We also found that > >>>>>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$ > >>>>>> > steers to > >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ > >>>>>> >. When we searched > >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ > >>>>>> > for > >>>>>> the number 095023r34, the result was "Nothing found, please try > >>>>>> adjusting your search." > >>>>>> > >>>>>> Should a different paper be listed here and cited in Appendices B and > >>>>>> C.5.1? > >>>>>> > >>>>>> Original: > >>>>>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document > >>>>>> 095023r34)", 2014. --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] Certainly, this seems to be an old reference. We have other > >>>>> examples, the best course of action would be to remove this reference > >>>>> and the associated text. > >>>>> Forced removal can be done by sending new specific key material to the > >>>>> devices that still belong to the network, excluding the removed device, > >>>>> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP > >>>>> [ZigbeeIP]. > >>>>> – > >>>>> Another example would be when a shared Network Key is required by the > >>>>> devices that join a network. An example of this Network Key can be > >>>>> found in Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD]. > >>>>> > >>>> = = = = = > >>>> > >>>> * Regarding our question 42) and your reply: Because TLS_SHA256, > >>>> TLS_SHA384, and TLS_SHA512 are already in the list, is it necessary to > >>>> also mention them in the preceding text? > >>>> > >>>> > >>>>>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this > >>>>>> sentence, along the lines of "The other supported and negotiated > >>>>>> cipher suites are the following" as seen in Section 6.1? > >>>>>> > >>>>>> Original: > >>>>>> The hash algorithms considered are the following: > >>>>>> > >>>>>> * 5) TLS_SHA256 > >>>>>> > >>>>>> * 6) TLS_SHA384 > >>>>>> > >>>>>> * 7) TLS_SHA512 > >>>>>> > >>>>>> Possibly: > >>>>>> The following hash algorithms are supported: > >>>>>> > >>>>>> * 5) TLS_SHA256 > >>>>>> > >>>>>> * 6) TLS_SHA384 > >>>>>> > >>>>>> * 7) TLS_SHA512 --> > >>>>>> > >>>>>> > >>>>> [Authors] Following the previous issue (point 25) > >>>>> Proposed text. > >>>>> The following hash algorithms are considered in case the specification > >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) > >>>>> > >>>> Possibly: > >>>> The following hash > >>>> algorithms are considered in cases where the specification includes DTLS > >>>> support in the future: > >>>> > >>> [AUTHORS] Having the ciphersuites already in the list, it is ok not to > >>> mention them in the preceding text. > >>> > >>> > >>>> = = = = = > >>>> > >>>> * Regarding our question 57) and the following items: > >>>> > >>>> > >>>>>> b) The following terms appear to be used inconsistently in this > >>>>>> document. Please let us know which form is preferred. > >>>>>> > >>>>>> "a/eap/1" (the URI for the first resource would be "a/eap/1") / > >>>>>> '/a/eap/1' > >>>>>> > >>>>>> > >>>>> [AUTHORS] "a/eap/1" > >>>>> > >>>> Apologies for missing this earlier: We see the following: > >>>> > >>>> > >>>>> So, per Figure 3, the URI for the first resource would be "a/eap/1". > >>>>> > >>>> We also see the following: > >>>> > >>>> > >>>>> '/a/eap/1' > >>>>> "/a/eap/1" > >>>>> > >>>> Are single quotes or double quotes preferred? > >>>> Also, please confirm that the single instance of "a/eap/1" is correct > >>>> (i.e., "would be "a/eap/1" should not be "would be /a/eap/1"). > >>>> > >>> [AUTHORS] Please, consider changing to double quotes. > >>> > >>> > >>> > >>>> = = = > >>>> > >>>> > >>>>>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP-Request/Identity > >>>>> > >>>>>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP-Response/Identity > >>>>> > >>>> Apologies for not realizing earlier that using the longer forms > >>>> "EAP-Request/Identity" and "EAP-Response/Identity" in Figures 3, 5, and > >>>> 8 could cause spacing issues in the SVG. > >>>> > >>>> To avoid such spacing issues and define these terms properly where first > >>>> used, we suggest the following: > >>>> > >>>> - In Section 3.2, define the abbreviated forms by changing "(EAP > >>>> Request/Identity)" to > >>>> "(EAP-Request/Identity, or EAP-Req/Id)" and changing "an EAP response > >>>> (EAP Resp/Id)" to > >>>> "an EAP response (EAP-Response/Identity, or EAP-Resp/Id)". > >>>> - In Section 6.1, change "both the EAP-Request/Identity and > >>>> EAP-Response/Identity" to > >>>> "both the EAP-Req/Id and EAP-Resp/Id". > >>>> - In Section 8.6, change "EAP Request/Id" to "EAP-Req/Id", and change > >>>> "EAP Response/Id" to "EAP-Resp/Id". > >>>> > >>>> > >>> [AUTHORS] No objections to the text update. > >>> > >>> > >>>> = = = > >>>> > >>>> Regarding this item: > >>>> > >>>> > >>>>>> EAP response / EAP Response (used generally in text, e.g., > >>>>>> "an EAP response", "an EAP Response") > >>>>>> (We also see "EAP Response header" in Section 7.1.) > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP Response > >>>>> > >>>> Please confirm that "EAP Response" when used generally in text is as > >>>> desired. We ask because we see "EAP request" used consistently > >>>> throughout the text when used generally. > >>>> > >>>> > >>> [AUTHORS] Both should be Capitalized. EAP Response and EAP Request. > >>> > >>> > >>>> = = = = = > >>>> > >>>> Regarding this item: > >>>> > >>>> > >>>>>> Session-Lifetime / Session-lifetime / Session Lifetime / > >>>>>> session lifetime (in running text) > >>>>>> (Figure 3 and Table 4 use "Session-Lifetime".) > >>>>>> > >>>>>> > >>>>> [AUTHORS] Session-Lifetime > >>>>> > >>>> After updating "session lifetime" to "Session-Lifetime", this sentence > >>>> is now a bit confusing, as RFC 5247 > >>>> does not mention "Session-Lifetime". Should this sentence be rephrased, > >>>> or will it be clear to readers? > >>>> > >>>> Original: > >>>> * Step 7. When the EAP authentication ends successfully, the EAP > >>>> authenticator obtains the Master Session Key (MSK) exported by the > >>>> EAP method, an EAP Success message, and some authorization > >>>> information (e.g., session lifetime) [RFC5247]. > >>>> > >>>> Currently: > >>>> * Step 7. When the EAP authentication ends successfully, the EAP > >>>> authenticator obtains the MSK exported by the EAP method, an EAP > >>>> Success message, and some authorization information (e.g., > >>>> Session-Lifetime) [RFC5247]. > >>>> > >>>> Possibly: > >>>> * Step 7. When the EAP authentication ends successfully, the EAP > >>>> authenticator obtains the MSK exported by the EAP method, an EAP > >>>> Success message, and some authorization information [RFC5247] (e.g., > >>>> Session-Lifetime). > >>>> > >>>> > >>> [AUTHORS] It is correct that Session-Lifetime is not specified in > >>> RFC5247, but it is something we propose to use as an authorization > >>> information instance so the “Possibly” text is correct for us. > >>> > >>> Thank you. > >>> Best regards. > >>> > >>>> = = = = = > >>>> > >>>> The latest files are posted here. Please refresh your browser: > >>>> > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbJZA27Ts$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbMyfW1jC$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbLKsqN1X$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbP80vQJQ$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbH0Jmnq8$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbEun-yU8$ > >>>> (side by side) > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48diff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbJC23Knu$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-auth48rfcdiff.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbN_-hSIL$ > >>>> (side by side) > >>>> > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbLA__aeT$ > >>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff2.html__;!!D9dNQwwGXtA!SmaxO7K_ObFZjodcUznRgUKaC4vxIdw6YKWcpvETu7efhpbuKT-ui8hXft2FSGl54UWkXEwnINU9-p9VCbIPCNIVbNa1m-S9$ > >>>> > >>>> Thanks again for your help and patience! > >>>> > >>>> RFC Editor/lb > >>>> > >>>> > >>>> > >>>>> On Jul 29, 2025, at 10:09 AM, Dan Garcia Carrillo <garcia...@uniovi.es> > >>>>> wrote: > >>>>> > >>>>> Dear RFC Editor, > >>>>> Please see answers inline. For the requested clarifications in Figures, > >>>>> we attach a .xml version with the figures updated. > >>>>> Please, let us know if anything else is required. > >>>>> > >>>>> El 18/7/25 a las 19:53, rfc-edi...@rfc-editor.org escribió: > >>>>> > >>>>>> Authors and AD*, > >>>>>> > >>>>>> *AD, please see question #1 below. > >>>>>> > >>>>>> Authors, while reviewing this document during AUTH48, please resolve > >>>>>> (as necessary) the following questions, which are also in the XML file. > >>>>>> > >>>>>> > >>>>>> 1) <!-- [rfced] *AD, text was added to the Acknowledgments section > >>>>>> after the > >>>>>> document was approved for publication. Please review the changes, and > >>>>>> let us know if you approve. > >>>>>> > >>>>>> Diff between v14 and v15: > >>>>>> https://urldefense.com/v3/__https://author-tools.ietf.org/iddiff?url2=draft-ietf-ace-wg-coap-eap-15__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH77QRYqZw$ > >>>>>> --> > >>>>>> > >>>>>> > >>>>>> 2) <!-- [rfced] Please note that the title of the document has been > >>>>>> updated as > >>>>>> follows. We expanded abbreviations per Section 3.6 of RFC 7322 ("RFC > >>>>>> Style Guide"), recast "-based" to avoid using a hyphen with an > >>>>>> expansion, > >>>>>> and added "for Use with". Please review. > >>>>>> > >>>>>> Original: > >>>>>> EAP-Based Authentication Service for CoAP > >>>>>> > >>>>>> Current: > >>>>>> Authentication Service Based on the Extensible Authentication Protocol > >>>>>> (EAP) for Use with the Constrained > >>>>>> Application Protocol (CoAP) > >>>>>> --> > >>>>>> > >>>>>> > >>>>> [Authors] This change is ok. > >>>>> > >>>>>> 3) <!-- [rfced] Please insert any keywords (beyond those that appear > >>>>>> in the > >>>>>> title) for use on > >>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/search__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7N7e55Gg$ > >>>>>> >. --> > >>>>>> > >>>>>> > >>>>> [Authors] We believe that these could be keywords representing the work: > >>>>> > >>>>> CoAP, EAP, EAP lower layer, Internet of Things, IoT, Constrained Node, > >>>>> Smart Object > >>>>> > >>>>> > >>>>>> 4) <!-- [rfced] Abstract: We had trouble following the meaning of > >>>>>> "transported" in this sentence. If the suggested text is not > >>>>>> correct, please provide clarifying text. > >>>>>> > >>>>>> Original: > >>>>>> This document specifies an authentication service that uses the > >>>>>> Extensible Authentication Protocol (EAP) transported employing > >>>>>> Constrained Application Protocol (CoAP) messages. > >>>>>> > >>>>>> Suggested: > >>>>>> This document specifies an authentication service that uses the > >>>>>> Extensible Authentication Protocol (EAP) as a transport method that > >>>>>> employs Constrained Application Protocol (CoAP) messages. --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text can be misleading as the protocol being > >>>>> carried is EAP and the one that carries EAP is CoAP. > >>>>> Next, our suggested text would be: > >>>>> This document specifies an authentication service that uses the > >>>>> Constrained Application Protocol (CoAP) as a transport method to > >>>>> carry the Extensible Authentication Protocol (EAP). > >>>>> > >>>>> > >>>>> > >>>>>> 5) <!-- [rfced] We found quite a few undefined abbreviations in this > >>>>>> document. For ease of the reader, we expanded as many of them as we > >>>>>> could find. Most were straightforward (e.g., SAML per RFC 7833, > >>>>>> PANA per RFC 5191), but please confirm that our expansions for MIC > >>>>>> (currently "Message Integrity Check") and LoRa (currently "Long > >>>>>> Range") are correct. > >>>>>> > >>>>>> Original: > >>>>>> EAP relies on lower layer error > >>>>>> detection (e.g., CRC, checksum, MIC, etc.). > >>>>>> ... > >>>>>> Given that EAP is also used for network access authentication, this > >>>>>> service can be adapted to other technologies. For instance, to > >>>>>> provide network access control to very constrained technologies > >>>>>> (e.g., LoRa network). > >>>>>> > >>>>>> Currently (fixed the incomplete sentence in the "LoRa" text): > >>>>>> EAP relies on lower-layer error > >>>>>> detection (e.g., CRC, checksum, Message Integrity Check (MIC), > >>>>>> etc.). > >>>>>> ... > >>>>>> Given that EAP is also used for network access authentication, this > >>>>>> service can be adapted to other technologies - for instance, to > >>>>>> provide network access control to very constrained technologies > >>>>>> (e.g., Long Range (LoRa) networks). --> > >>>>>> > >>>>>> > >>>>> [Authors] Yes, these suggestions are correct. > >>>>> > >>>>> > >>>>>> 6) <!-- [rfced] Section 2: These sentences did not parse. We updated > >>>>>> the text. If this is incorrect, please provide clarifying text. > >>>>>> > >>>>>> Original: > >>>>>> The rationale behind this decision > >>>>>> is that EAP requests direction is always from the EAP server to the > >>>>>> EAP peer. Accordingly, EAP responses direction is always from the > >>>>>> EAP peer to the EAP server. > >>>>>> > >>>>>> Currently: > >>>>>> The rationale behind this decision is that EAP requests will always > >>>>>> travel from the EAP server to the EAP peer. Accordingly, EAP > >>>>>> responses will always travel from the EAP peer to the EAP server. --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] Yes, these suggestions are correct. > >>>>> > >>>>> > >>>>> > >>>>>> 7) <!-- [rfced] Please review each artwork element. Should any artwork > >>>>>> element be tagged as sourcecode? If the current list of preferred > >>>>>> values for "type" on > >>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5spEm40g$ > >>>>>> > > >>>>>> does not contain an applicable type, please let us know. Also, it is > >>>>>> acceptable to leave the "type" attribute unset. --> > >>>>>> > >>>>>> > >>>>> [Authors] We assume that this is in reference to "Figure 6: CBOR Data > >>>>> Structure for CoAP-EAP". > >>>>> It is not our intention to specify sourcecode, it could be left as type > >>>>> unset. > >>>>> > >>>>> > >>>>>> 8) <!-- [rfced] Figure 1: We see "(SCOPE OF THIS DOCUMENT)" in the > >>>>>> ASCII art but "SCOPE OF THIS DOCUMENT" in the SVG. If you prefer the > >>>>>> parentheses, please correct the SVG in the edited copy of the XML. > >>>>>> If you prefer that the parentheses be removed, let us know, and we > >>>>>> will update the ASCII art accordingly. --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] There are no need for parentheses, the message is clear > >>>>> without them. > >>>>> > >>>>> > >>>>>> 9) <!-- [rfced] Figure 2: We changed "Request/Responses/Signaling" to > >>>>>> "Request / Responses / Signaling", to match the spacing style of the > >>>>>> other entries in the figure. However, the "Request / Responses / > >>>>>> Signaling" line now looks a bit crowded in the SVG renderings in the > >>>>>> HTML and PDF output files. We cannot determine where in the SVG a > >>>>>> coordinate should be modified to correct the spacing. Please correct > >>>>>> the SVG in the edited copy of the XML. --> > >>>>>> > >>>>>> > >>>>> [Authors] The line should say > >>>>> Requests / Responses / Signaling > >>>>> > >>>>> We have provided a new <artwork> code in the attached document > >>>>> rfc9820_modified.xml that is not so crowded and tries to convey the > >>>>> improvements. > >>>>> This is also updated in svg in the attached file rfc9820_modified.xml > >>>>> > >>>>> > >>>>>> 10) <!-- [rfced] Sections 3.1 and subsequent: We see phrases such as > >>>>>> "an intermediary proxy", "intermediary (i.e., proxy)", and > >>>>>> "intermediaries such as proxies" in this document. Will the > >>>>>> distinction regarding whether or not intermediaries are sometimes or > >>>>>> always proxies be clear to readers? --> > >>>>>> > >>>>>> > >>>>> [Authors] We are following CoAP terminology, being according to rfc7252 > >>>>> Intermediary > >>>>> A CoAP endpoint that acts both as a server and as a client towards an > >>>>> origin server (possibly via further intermediaries). A common form of > >>>>> an intermediary is a proxy; several classes of such proxies are > >>>>> discussed in this specification. > >>>>> Maybe the following modifications would make this clearer to the reader. > >>>>> 3.1. Discovery > >>>>> Before the CoAP-EAP exchange takes place, the EAP peer needs to > >>>>> discover the EAP authenticator or the entity that will enable the > >>>>> CoAP-EAP exchange (e.g.i.e., an intermediary proxy). > >>>>> —- > >>>>> 8.3. Allowing CoAP-EAP Traffic to Perform Authentication > >>>>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP > >>>>> connectivity in the link between the EAP peer and the EAP authenticator > >>>>> to run. This link MUST authorize exclusively unprotected IP traffic to > >>>>> be sent between the EAP peer and the EAP authenticator during the > >>>>> authentication with CoAP-EAP. Once the authentication is successful, > >>>>> the key material generated by the EAP authentication (MSK) and any > >>>>> other traffic can be authorized if it is protected. It is worth noting > >>>>> that if the EAP authenticator is not in the same link as the EAP peer > >>>>> and an intermediate entity (i.e.e.g., a CoAP proxy) helps with this > >>>>> process, this concept also applies to the communication between the EAP > >>>>> peer and the intermediary. > >>>>> —- > >>>>> When the EAP peer intends to be admitted into the network, it would > >>>>> search for an entity that offers the CoAP-EAP service, be it directly > >>>>> via the EAP authenticator or through an intermediary (i.e.e.g., proxy). > >>>>> See Section 3.1. > >>>>> — > >>>>> If the EAP peer cannot connect to the EAP authenticator directly, the > >>>>> EAP peer can follow the same process as that described in Section 3.6 > >>>>> to perform the authentication (i.e., can connect via an intermediary > >>>>> entity (e.g., proxy) that is already part of the network (already > >>>>> shares key material and communicates through a secure channel with the > >>>>> authenticator) and can aid in running CoAP-EAP). > >>>>> — > >>>>> When CoAP-EAP is completed and the OSCORE security association is > >>>>> established with the EAP authenticator, the EAP peer receives the local > >>>>> configuration parameters for the network (e.g., a network key) and can > >>>>> configure a global IPv6 address. Moreover, there is no need for a CoAP > >>>>> proxy an intermediary entity after a successful authentication. > >>>>> > >>>>> > >>>>>> 11) <!-- [rfced] Section 3.1: This sentence does not parse. If neither > >>>>>> suggestion below is correct, please clarify the meaning of "hence". > >>>>>> > >>>>>> Original: > >>>>>> For > >>>>>> example, on a 6LoWPAN network, the Border Router will typically act > >>>>>> as the EAP authenticator hence, after receiving the Router > >>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may > >>>>>> engage on the CoAP-EAP exchange. > >>>>>> > >>>>>> Suggestion #1: > >>>>>> For > >>>>>> example, in a 6LoWPAN network, the Border Router will henceforth > >>>>>> typically act as the EAP authenticator. After receiving the Router > >>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may > >>>>>> engage in the CoAP-EAP exchange. > >>>>>> > >>>>>> Suggestion #2: > >>>>>> For > >>>>>> example, in a 6LoWPAN network, the Border Router will typically act > >>>>>> as the EAP authenticator. Hence, after receiving the Router > >>>>>> Advertisement (RA) messages from the Border Router, the EAP peer may > >>>>>> engage in the CoAP-EAP exchange. --> > >>>>>> > >>>>>> > >>>>> [Authors] Suggestion #2 > >>>>> > >>>>> > >>>>>> 12) <!-- [rfced] Section 3.2: Please confirm that the "Implementation > >>>>>> notes" paragraph and bullet list should remain independent of Step 0 > >>>>>> (i.e., should not be indented so that it is part of Step 0). We see > >>>>>> "resource of a step of the authentication" in the text, which seems > >>>>>> to indicate that this information applies to all steps and not just > >>>>>> Step 0, but we would still like you to confirm that the current > >>>>>> indentation levels are correct. > >>>>>> > >>>>>> Original: > >>>>>> * Step 0. The EAP peer MUST start the CoAP-EAP process by sending a > >>>>>> "POST /.well-known/coap-eap" request (trigger message). This > >>>>>> message carries the 'No-Response' [RFC7967] CoAP option to avoid > >>>>>> waiting for a response that is not needed. This is the only > >>>>>> message where the EAP authenticator acts as a CoAP server and the > >>>>>> EAP peer as a CoAP client. The message also includes a URI in the > >>>>>> payload of the message to indicate the resource where the EAP > >>>>>> authenticator MUST send the next message. The name of the > >>>>>> resource is selected by the CoAP server. > >>>>>> > >>>>>> Implementation notes: When generating the URI for a resource of a > >>>>>> step of the authentication, the resource could have the following > >>>>>> format as an example "path/eap/counter", where: > >>>>>> > >>>>>> * "path" is some local path on the device to make the path unique. > >>>>>> This could be omitted if desired. > >>>>>> > >>>>>> * "eap" is the name that indicates the URI is for the EAP peer. > >>>>>> This has no meaning for the protocol but helps with debugging. > >>>>>> > >>>>>> * "counter' which is an incrementing unique number for every new EAP > >>>>>> request. > >>>>>> > >>>>>> So, in Figure 3 for example, the URI for the first resource would be > >>>>>> “a/eap/1" > >>>>>> > >>>>>> * Step 1. ... --> > >>>>>> > >>>>>> > >>>>> [Authors] Yes, the "Implementation notes" paragraph and bullet list > >>>>> should remain independent of Step 0 > >>>>> > >>>>> > >>>>>> 13) <!-- [rfced] Section 3.2: Do "assigns" and "sends" refer to the > >>>>>> EAP peer or the EAP peer state machine? If the suggested text is not > >>>>>> correct, please provide clarifying text. > >>>>>> > >>>>>> Original (previous text is included for context): > >>>>>> * Step 2. The EAP peer processes the POST message sending the EAP > >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns > >>>>>> an EAP response (EAP Resp/Id). Then, assigns a new resource to > >>>>>> the ongoing authentication process (e.g., '/a/eap/2'), and deletes > >>>>>> the previous one ('/a/eap/1'). Finally, sends a '2.01 Created' > >>>>>> response with the new resource identifier in the Location-Path > >>>>>> (and/or Location-Query) options for the next step. > >>>>>> > >>>>>> Suggested (guessing the EAP peer state machine): > >>>>>> * Step 2. The EAP peer processes the POST message, sending the EAP > >>>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns > >>>>>> an EAP response (EAP Resp/Id). Then, the EAP peer state machine > >>>>>> assigns a new resource to the ongoing authentication process > >>>>>> (e.g., '/a/eap/2') and deletes the previous one ('/a/eap/1'). > >>>>>> Finally, the EAP peer state machine sends a '2.01 Created' > >>>>>> response with the new resource identifier in the Location-Path > >>>>>> (and/or Location-Query) options for the next step. --> > >>>>>> > >>>>>> > >>>>> [Authors] We believe the best way to specify this is to differentiate > >>>>> between "EAP peer state machine" and the CoAP-EAP application of the > >>>>> EAP peer. > >>>>> The EAP peer state machine only deals with EAP messages. Processes EAP > >>>>> requests and returns an EAP response. > >>>>> With that, the CoAP-EAP application within the EAP peer takes control > >>>>> and manages everything CoAP related. Assigns a new resource to the > >>>>> ongoing authentication process (e.g., '/a/eap/2') and deletes the > >>>>> previous one ('/a/eap/1') > >>>>> So, a suggested new text. > >>>>> Step 2. The EAP peer processes the POST message sending the EAP > >>>>> request (EAP-Req/Id) to the EAP peer state machine, which returns > >>>>> an EAP response (EAP Resp/Id). Then, the CoAP-EAP application > >>>>> assigns a new resource to the ongoing authentication process > >>>>> (e.g., '/a/eap/2'), and deletes the previous one ('/a/eap/1'). > >>>>> Finally, sends a '2.01 Created'response with the new resource > >>>>> identifier in the Location-Path (and/or Location-Query) options > >>>>> for the next step. > >>>>> > >>>>> > >>>>> > >>>>>> 14) <!-- [rfced] Section 3.2: Please clarify the meaning of "response > >>>>>> to > >>>>>> carry the EAP response" in this sentence. > >>>>>> > >>>>>> Original: > >>>>>> The EAP peer will use a response to carry the EAP response in the > >>>>>> payload. --> > >>>>>> > >>>>>> > >>>>> [Authors] The text should say: > >>>>> The EAP peer will use a CoAP response to carry the EAP response in the > >>>>> payload. > >>>>> > >>>>> > >>>>>> 15) <!-- [rfced] Section 3.5: The second sentence was incomplete and > >>>>>> difficult to follow. Per Sections 3.5.1 through 3.5.3, we updated > >>>>>> this section as noted below. If this is incorrect, please clarify. > >>>>>> > >>>>>> Original: > >>>>>> This section elaborates on how different errors are handled. From > >>>>>> EAP authentication failure, a non-responsive endpoint lost messages, > >>>>>> or an initial POST message arriving out of place. > >>>>>> > >>>>>> Currently: > >>>>>> This section elaborates on how different errors are handled: EAP > >>>>>> authentication failure (Section 3.5.1), a non-responsive endpoint > >>>>>> (Section 3.5.2), and duplicated messages (Section 3.5.3). --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 16) <!-- [rfced] Section 3.5.2: We could not follow the meaning of this > >>>>>> run-on sentence. If the suggested text is not correct, please > >>>>>> provide clarifying text. > >>>>>> > >>>>>> Original: > >>>>>> By default, CoAP-EAP adopts the > >>>>>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and > >>>>>> Authenticator to remove the CoAP-EAP state if the authentication > >>>>>> process has not progressed in that time, in consequence, it has not > >>>>>> been completed. > >>>>>> > >>>>>> Suggested: > >>>>>> By default, CoAP-EAP adopts the > >>>>>> value of EXCHANGE_LIFETIME as a timer in the EAP peer and > >>>>>> authenticator to remove the CoAP-EAP state if the authentication > >>>>>> process has not progressed to completion during that time. --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>>> 17) <!-- [rfced] Section 3.5.3: Does "Step 0" here refer to Step 0 in > >>>>>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest > >>>>>> adding a citation for the appropriate figure. > >>>>>> > >>>>>> Original: > >>>>>> The reception of the trigger message in Step 0 containing the URI > >>>>>> /coap-eap needs some additional considerations, as the resource is > >>>>>> always available in the EAP authenticator. --> > >>>>>> > >>>>>> > >>>>> [Authors] This first instance of Step 0 is referring to the complete > >>>>> Flow in Figure 3. > >>>>> The last instance refers to Figure 5. > >>>>> For clarity the text would be: > >>>>> The reception of the trigger message (Step 0 in Figure 3) containing > >>>>> the URI /coap-eap needs some additional considerations, as the resource > >>>>> is always available in the EAP authenticator. > >>>>> If a trigger message arrives at the EAP authenticator during an ongoing > >>>>> authentication with the same EAP peer, the EAP authenticator MUST > >>>>> silently discard this trigger message. > >>>>> If an old "POST /.well-known/coap-eap" (Step 0 in Figure 5) arrives at > >>>>> the EAP authenticator and there is no authentication ongoing, the EAP > >>>>> authenticator may understand that a new authentication process is > >>>>> requested. Consequently, the EAP authenticator will start a new EAP > >>>>> authentication. However, if the EAP peer did not start any > >>>>> authentication and therefore, it did not select any resource for the > >>>>> EAP authentication. Thus, the EAP peer sends a '4.04 Not Found' in the > >>>>> response. > >>>>> > >>>>> > >>>>>> 18) <!-- [rfced] Section 3.5.3: The "However, if ..." sentence is > >>>>>> incomplete; it appears that some words are missing. Please clarify > >>>>>> this text. > >>>>>> > >>>>>> Original (the previous and next sentences are included for context): > >>>>>> Consequently, the EAP authenticator will start a new EAP > >>>>>> authentication. However, if the EAP peer did not start any > >>>>>> authentication and therefore, it did not select any resource for the > >>>>>> EAP authentication. Thus, the EAP peer sends a '4.04 Not found' in > >>>>>> the response (Figure 5). --> > >>>>>> > >>>>>> > >>>>> [Authors] Maybe this is simpler, > >>>>> “However, if the EAP peer did not start any authentication, it will > >>>>> send a '4.04 Not found' in the response (Figure 5).” > >>>>> > >>>>>> 19) <!-- [rfced] Section 3.6: The following sentences do not parse. > >>>>>> > >>>>>> If the suggested text for the first sentence is not correct, please > >>>>>> provide clarifying text. > >>>>>> > >>>>>> We cannot follow the meaning of the second sentence. Please clarify > >>>>>> "the proxy will act as forward, and as reverse for the rest". > >>>>>> > >>>>>> Original (the first sentence is included for context): > >>>>>> After that, in the > >>>>>> remaining exchanges the roles are reversed, being the EAP peer, the > >>>>>> CoAP server, and the EAP authenticator, the CoAP client. When using > >>>>>> a proxy in the exchange, for message 0, the proxy will act as > >>>>>> forward, and as reverse for the rest. > >>>>>> > >>>>>> Suggested (first sentence): > >>>>>> In the remaining exchanges, the roles are reversed (i.e., the EAP > >>>>>> peer acts as the CoAP server, and the EAP authenticator acts as the > >>>>>> CoAP client). --> > >>>>>> > >>>>>> > >>>>> [Authors] The text would be the following, hopefully it is clearer: > >>>>> In the remaining exchanges, the roles are reversed (i.e., the EAP > >>>>> peer acts as the CoAP server, and the EAP authenticator acts as the > >>>>> CoAP client). When using a proxy in the exchange, for message 0 it will > >>>>> act as a forward proxy, and as a reverse proxy for the rest. > >>>>> > >>>>>> 20) <!-- [rfced] Section 5: We found this sentence confusing, because > >>>>>> the plural "Examples" is used but the text that follows shows an > >>>>>> "either-or" relationship ("cipher suites that need to be negotiated > >>>>>> or ..."). If the suggested text is not correct, please provide > >>>>>> clarifying text. > >>>>>> > >>>>>> Original (the previous sentence is included for context): > >>>>>> In the CoAP-EAP exchange, there is information that needs to be > >>>>>> exchanged between the two entities. Examples of this information are > >>>>>> the cipher suites that need to be negotiated or authorization > >>>>>> information (Session-lifetime). > >>>>>> > >>>>>> Suggested: > >>>>>> In the CoAP-EAP exchange, information needs to be exchanged between > >>>>>> the two entities - for example, the cipher suites that need to be > >>>>>> negotiated, or authorization information (Session-lifetime). --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 21) <!-- [rfced] Section 5: Per Figure 6, Table 4, and > >>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ > >>>>>> >, we moved the RID-I item > >>>>>> so that it is the third item (Label 3, per Figure 6, Table 4, and > >>>>>> IANA) instead of the second; RID-C is now the second item. > >>>>>> Please let us know any objections. > >>>>>> > >>>>>> Original: > >>>>>> 2. RID-I: Is the Recipient ID of the EAP peer. The EAP > >>>>>> authenticator uses this value as a Sender ID for its OSCORE > >>>>>> Sender Context. The EAP peer uses this value as Recipient ID for > >>>>>> its Recipient Context. > >>>>>> > >>>>>> 3. RID-C: Is the Recipient ID of the EAP authenticator. The EAP > >>>>>> peer uses this value as a Sender ID for its OSCORE Sender > >>>>>> Context. The EAP authenticator uses this value as Recipient ID > >>>>>> for its Recipient Context. > >>>>>> > >>>>>> Currently: > >>>>>> 2. RID-C: The Recipient ID of the EAP authenticator. The EAP peer > >>>>>> uses this value as the Sender ID for its OSCORE Sender Context. > >>>>>> The EAP authenticator uses this value as the Recipient ID for its > >>>>>> Recipient Context. > >>>>>> > >>>>>> 3. RID-I: The Recipient ID of the EAP peer. The EAP authenticator > >>>>>> uses this value as the Sender ID for its OSCORE Sender Context. > >>>>>> The EAP peer uses this value as the Recipient ID for its > >>>>>> Recipient Context. --> > >>>>>> > >>>>>> > >>>>> [Authors] No objection. > >>>>> > >>>>> > >>>>> > >>>>>> 22) <!-- [rfced] Section 6.1: Does "Steps 1 and 2" here refer to > >>>>>> Steps 1 and 2 in Figure 3 or Steps 1 and 2 in Figure 8? > >>>>>> For ease of the reader, we suggest adding a citation for the > >>>>>> appropriate figure. > >>>>>> > >>>>>> Original: > >>>>>> OSCORE runs after the EAP authentication, using the cipher suite > >>>>>> selected in the cipher suite negotiation (Steps 1 and 2). --> > >>>>>> > >>>>>> > >>>>> [Authors] We refer to Figure 3 in the first instance. To Figure 8 in > >>>>> the other instances in that section. Corrected text below: > >>>>> OSCORE runs after the EAP authentication, using the cipher suite > >>>>> selected in the cipher suite negotiation (Steps 1 and 2 in Figure 3). > >>>>> To negotiate the cipher suite, CoAP-EAP follows a simple approach: The > >>>>> EAP authenticator sends a list, in decreasing order of preference, with > >>>>> the identifiers of the supported cipher suites (Step 1 in Figure 8). In > >>>>> the response to that message (Step 2 in Figure 8), the EAP peer sends > >>>>> its choice. > >>>>> > >>>>> > >>>>> > >>>>>> 23) <!-- [rfced] Section 6.1: We had trouble following this sentence. > >>>>>> If the suggested text is not correct, please clarify "where it can be > >>>>>> appreciated the disposition". > >>>>>> > >>>>>> Original: > >>>>>> An example of the exchange with the > >>>>>> cipher suite negotiation is shown in Figure 8, where it can be > >>>>>> appreciated the disposition of both EAP-Request/Identity and EAP- > >>>>>> Response/Identity, followed by the CBOR object defined in Section 5, > >>>>>> containing the cipher suite field for the cipher suite negotiation. > >>>>>> > >>>>>> Suggested: > >>>>>> An example exchange for the > >>>>>> cipher suite negotiation is shown in Figure 8. The > >>>>>> EAP request (EAP-Request/Identity) and EAP response > >>>>>> (EAP-Response/Identity) are sent; both messages include the CBOR > >>>>>> object (Section 5) containing the cipher suite field for the cipher > >>>>>> suite negotiation. --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok > >>>>> > >>>>> > >>>>> > >>>>> > >>>>>> 24) <!-- [rfced] Figure 7: We note that the ASCII art has two pipes > >>>>>> (with "+" > >>>>>> above each) between the "Data" and "cipher suites" fields, while the > >>>>>> SVG > >>>>>> has vertical lines along with curved lines that intersect each > >>>>>> other. Please review and correct the edited copy of the XML if needed. > >>>>>> --> > >>>>>> > >>>>>> > >>>>> [Authors] We provided a new Figure in the xml attached file that > >>>>> hopefully is much more clearer. > >>>>> > >>>>> > >>>>>> 25) <!-- [rfced] Sections 6.1 and Appendix A: Do these algorithms need > >>>>>> to be numbered? If yes, will this numbering scheme be clear to > >>>>>> readers? > >>>>>> > >>>>>> Original: > >>>>>> * 0) AES-CCM-16-64-128, SHA-256 (default) > >>>>>> > >>>>>> * 1) A128GCM, SHA-256 > >>>>>> > >>>>>> * 2) A256GCM, SHA-384 > >>>>>> > >>>>>> * 3) ChaCha20/Poly1305, SHA-256 > >>>>>> > >>>>>> * 4) ChaCha20/Poly1305, SHAKE256 > >>>>>> ... > >>>>>> * 5) TLS_SHA256 > >>>>>> > >>>>>> * 6) TLS_SHA384 > >>>>>> > >>>>>> * 7) TLS_SHA512 > >>>>>> > >>>>>> Perhaps: > >>>>>> * AES-CCM-16-64-128, SHA-256 (default) > >>>>>> > >>>>>> * A128GCM, SHA-256 > >>>>>> > >>>>>> * A256GCM, SHA-384 > >>>>>> > >>>>>> * ChaCha20/Poly1305, SHA-256 > >>>>>> > >>>>>> * ChaCha20/Poly1305, SHAKE256 > >>>>>> ... > >>>>>> * TLS_SHA256 > >>>>>> > >>>>>> * TLS_SHA384 > >>>>>> > >>>>>> * TLS_SHA512 > >>>>>> > >>>>>> --> > >>>>>> > >>>>>> > >>>>> [Authors] The numbers on Sections 6.1 match the values in “9.1. > >>>>> CoAP-EAP Cipher Suites”. > >>>>> The numbers in Appendix A are the expected continuation of these, but > >>>>> are not in the specification, and not in the IANA section. This text > >>>>> should also solve issue 42 as well. > >>>>> Suggested update text: > >>>>> The following hash algorithms are considered in case the specification > >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) > >>>>> > >>>>> > >>>>>> 26) <!-- [rfced] Section 6.2: Does "Steps 7 and 8" here refer to > >>>>>> Steps 7 and 8 in Figure 3? If yes, for ease of the reader we suggest > >>>>>> adding a citation for Figure 3. > >>>>>> > >>>>>> Original: > >>>>>> The derivation of the security context for OSCORE allows securing the > >>>>>> communication between the EAP peer and the EAP authenticator once the > >>>>>> MSK has been exported, providing confidentiality, integrity, key > >>>>>> confirmation (Steps 7 and 8), and downgrading attack detection. --> > >>>>>> > >>>>>> > >>>>> [Authors] Yes, we refer to Figure 3. > >>>>> > >>>>> > >>>>>> 27) <!-- [rfced] Section 6.2: We clarified these sentences as noted > >>>>>> below. If these updates are incorrect, please clarify "the cipher > >>>>>> suite 0". > >>>>>> > >>>>>> Original: > >>>>>> If CS-C or CS-I were not sent, (i.e., default algorithms are used) > >>>>>> the value used to generate CS will be the same as if the default > >>>>>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR > >>>>>> array with the cipher suite 0). > >>>>>> ... > >>>>>> If CS-C or CS-I were not sent, (i.e., default algorithms are used) > >>>>>> the value used to generate CS will be the same as if the default > >>>>>> algorithms were explicitly sent in CS-C or CS-I (i.e., a CBOR > >>>>>> array with the cipher suite 0). > >>>>>> > >>>>>> Currently: > >>>>>> If neither CS-C nor CS-I was sent (i.e., default algorithms are > >>>>>> used), the value used to generate CS will be the same as if the > >>>>>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a > >>>>>> CBOR array with the cipher suite value of 0). > >>>>>> ... > >>>>>> If neither CS-C nor CS-I was sent (i.e., default algorithms are > >>>>>> used), the value used to generate CS will be the same as if the > >>>>>> default algorithms were explicitly sent in CS-C or CS-I (i.e., a > >>>>>> CBOR array with the cipher suite value of 0). --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 28) <!-- [rfced] Please review instances of the term "NULL" as used in > >>>>>> this > >>>>>> document and let us know if any updates are needed. We believe that > >>>>>> "NULL" should be updated to either "NUL" (that is, referring to the > >>>>>> specific ASCII control code) or "null". --> > >>>>>> > >>>>>> > >>>>> [Authors] We mean the same as the instance you can find in rfc5191 of > >>>>> PANA page 16 > >>>>> - "IETF PANA" is the ASCII code representation of the non-NULL > >>>>> terminated string (excluding the double quotes around it). > >>>>> > >>>>> > >>>>> > >>>>>> 29) <!-- [rfced] Section 7.1: We changed this text as noted below. > >>>>>> Please review carefully (including our expansion of "AVP" for ease of > >>>>>> the reader), and let us know if anything is incorrect. > >>>>>> > >>>>>> Original: > >>>>>> Note: When EAP > >>>>>> is proxied over an AAA framework, the Access-Request packets in > >>>>>> RADIUS MUST contain a Framed-MTU attribute with the value 1024, and > >>>>>> the Framed-MTU AVP to 1024 in DIAMETER This attribute signals the AAA > >>>>>> server that it should limit its responses to 1024 octets. > >>>>>> > >>>>>> Currently: > >>>>>> Note: When EAP is proxied over a AAA framework, the > >>>>>> Access-Request packets in RADIUS MUST contain a Framed-MTU > >>>>>> attribute with a value of 1024 and, in Diameter, the Framed-MTU > >>>>>> Attribute-Value Pair (AVP) with a value of 1024. This information > >>>>>> signals the AAA server that it should limit its responses to 1024 > >>>>>> octets. --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 30) <!-- [rfced] Section 7.2: This sentence is difficult to parse. If > >>>>>> the suggested text is not correct, please rephrase "constrained > >>>>>> devices and network scenarios" and "older versions with the goal of > >>>>>> economization". > >>>>>> > >>>>>> Also, please review and let us know whether this "Note:" item that is > >>>>>> set off in a separate paragraph should be in the <aside> element. > >>>>>> <aside> is defined as "a container for content that is semantically > >>>>>> less important or tangential to the content that surrounds it" > >>>>>> (https://urldefense.com/v3/__https://authors.ietf.org/en/rfcxml-vocabulary*aside__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5DOBldVg$ > >>>>>> ). > >>>>>> > >>>>>> Original: > >>>>>> Note: For constrained devices and network scenarios, the use of the > >>>>>> latest versions of EAP methods (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 > >>>>>> [RFC9190]) is recommended in favor of older versions with the goal of > >>>>>> economization, or EAP methods more adapted for IoT (e.g., EAP-NOOB > >>>>>> [RFC9140], EAP-EDHOC [I-D.ietf-emu-eap-edhoc], etc.). > >>>>>> > >>>>>> Suggested: > >>>>>> Note: To improve efficiency in environments with > >>>>>> constrained devices and networks, the latest versions of EAP methods > >>>>>> (e.g., EAP-AKA' [RFC5448], EAP-TLS 1.3 [RFC9190]) are recommended over > >>>>>> older versions. EAP methods more adapted for IoT networks (e.g., > >>>>>> EAP-NOOB [RFC9140], EAP-EDHOC [EAP-EDHOC], etc.) are also > >>>>>> recommended. --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 31) <!-- [rfced] Section 8.2: This sentence did not parse. We updated > >>>>>> it as noted below. If this update is incorrect, please clarify > >>>>>> "can be with the transport of SAML". > >>>>>> > >>>>>> Original: > >>>>>> Providing more fine-grained > >>>>>> authorization data can be with the transport of SAML in RADIUS > >>>>>> [RFC7833]. > >>>>>> > >>>>>> Currently: > >>>>>> Providing more fine-grained > >>>>>> authorization data can be done by transporting the data using the > >>>>>> Security Assertion Markup Language (SAML) in RADIUS [RFC7833]. --> > >>>>>> > >>>>>> > >>>>> [Authors] Currently suggested text is ok. > >>>>> > >>>>>> 32) <!-- [rfced] Section 8.3: > >>>>>> > >>>>>> a) To what does "exclusively" refer in this sentence? If the > >>>>>> suggested text is not correct, please clarify. > >>>>>> > >>>>>> Original (the previous sentence is included for context): > >>>>>> Since CoAP is an application protocol, CoAP-EAP assumes certain IP > >>>>>> connectivity in the link between the EAP peer and the EAP > >>>>>> authenticator to run. This link MUST authorize exclusively > >>>>>> unprotected IP traffic to be sent between the EAP peer and the EAP > >>>>>> authenticator during the authentication with CoAP-EAP. > >>>>>> > >>>>>> Suggested: > >>>>>> This link MUST only authorize > >>>>>> unprotected IP traffic to be sent between the EAP peer and the EAP > >>>>>> authenticator during the authentication with CoAP-EAP. > >>>>>> > >>>>>> > >>>>> [Authors] We mean that this link will only allow unprotected traffic > >>>>> between the EAP peer and the EAP for the purpose of running CoAP-EAP. > >>>>> Any other traffic should not be allowed. > >>>>> > >>>>> The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> b) This sentence did not parse. We updated it to make a complete > >>>>>> sentence. Please review this update carefully; if it is incorrect, > >>>>>> please clarify. > >>>>>> > >>>>>> Original: > >>>>>> It is worth noting that if the EAP authenticator is not > >>>>>> in the same link as the EAP peer and an intermediate entity helps > >>>>>> with this process (i.e., CoAP proxy) and the same comment applies to > >>>>>> the communication between the EAP peer and the intermediary. > >>>>>> > >>>>>> Currently: > >>>>>> It is worth noting that if the EAP authenticator is not > >>>>>> in the same link as the EAP peer and an intermediate entity (i.e., a > >>>>>> CoAP proxy) helps with this process, this concept also applies to the > >>>>>> communication between the EAP peer and the intermediary. --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>>> 33) <!-- [rfced] Section 8.5: Does "the document" refer to RFC 6677 or > >>>>>> this document? Also, how may we update "(To be assigned by IANA)"? > >>>>>> > >>>>>> Original (the previous paragraph is included for context): > >>>>>> According to the [RFC6677], channel binding, related to EAP, is sent > >>>>>> through the EAP method supporting it. > >>>>>> > >>>>>> To satisfy the requirements of the document, the EAP lower layer > >>>>>> identifier (To be assigned by IANA) needs to be sent, in the EAP > >>>>>> Lower-Layer Attribute if RADIUS is used. > >>>>>> > >>>>>> Perhaps: > >>>>>> To satisfy the requirements of this document, the EAP lower-layer > >>>>>> identifier for CoAP-EAP (10) needs to be sent, in the EAP > >>>>>> Lower-Layer Attribute if RADIUS is used. > >>>>>> > >>>>>> Or: > >>>>>> To satisfy the requirements of this document, the EAP lower-layer > >>>>>> identifier assigned by IANA (see Section 9.4) needs to be sent, in the > >>>>>> EAP > >>>>>> Lower-Layer Attribute if RADIUS is used. > >>>>>> --> > >>>>>> > >>>>>> > >>>>> [Authors] We believe the first proposal is ok > >>>>> To satisfy the requirements of this document, the EAP lower-layer > >>>>> identifier for CoAP-EAP (10) needs to be sent, in the EAP > >>>>> Lower-Layer Attribute if RADIUS is used. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>>> 34) <!-- [rfced] Section 8.6: Does "Step 0" here refer to Step 0 in > >>>>>> Figure 3 or Step 0 in Figure 5? For ease of the reader, we suggest > >>>>>> adding a citation for the appropriate figure. > >>>>>> > >>>>>> Original: > >>>>>> For instance, an attacker can forge > >>>>>> multiple initial messages to start an authentication (Step 0) with > >>>>>> the EAP authenticator as if they were sent by different EAP peers. --> > >>>>>> > >>>>>> > >>>>> [Authors] we refer to Figure 3. > >>>>> > >>>>> > >>>>> > >>>>>> 35) <!-- [rfced] Sections 9.1 and 9.2: The name "CoAP-EAP protocol" > >>>>>> for the new > >>>>>> registry group reads oddly, as it means "Constrained Application > >>>>>> Protocol-Extensible Authentication Protocol protocol". May we change > >>>>>> the > >>>>>> name of the new registry group to "CoAP-EAP"? > >>>>>> > >>>>>> If yes, we will ask IANA to update the registry group name on > >>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/coap-eap.xhtml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6tPX02Xg$ > >>>>>> >. > >>>>>> (We could not find an existing IANA registry with the name "CoAP-EAP", > >>>>>> so this name would be unique (but we would confirm this with IANA).) > >>>>>> > >>>>>> Original: > >>>>>> IANA has created a new registry titled "CoAP-EAP Cipher Suites" under > >>>>>> the new group name "CoAP-EAP protocol". > >>>>>> ... > >>>>>> IANA has created a new registry titled "CoAP-EAP Information element" > >>>>>> under the new group name "CoAP-EAP protocol". --> > >>>>>> > >>>>>> > >>>>> [Authors] The suggested changes are ok for us. > >>>>> > >>>>> > >>>>> > >>>>>> 36) <!-- [rfced] Section 9.2: Because there is no "Value" entity in the > >>>>>> "CoAP-EAP Information Elements" registry, we changed "Value" to > >>>>>> "Label" per > >>>>>> <https://urldefense.com/v3/__https://www.iana.org/assignments/coap-eap/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4SyTyIVA$ > >>>>>> >. If this is > >>>>>> incorrect, please clarify the list of columns in the "CoAP-EAP > >>>>>> Information Elements" registry. > >>>>>> > >>>>>> Original: > >>>>>> The columns of the registry are Name, Label, CBOR Type, Description > >>>>>> and Reference, where Value is an integer, and the other columns are > >>>>>> text strings. > >>>>>> > >>>>>> Currently: > >>>>>> The columns of the registry are Name, Label, CBOR Type, Description, > >>>>>> and Reference, where Label is an integer and the other columns are > >>>>>> text strings. --> > >>>>>> > >>>>>> > >>>>> [Authors] The proposed text is correct. > >>>>> > >>>>> > >>>>> > >>>>>> 37) <!-- [rfced] [TS133.501]: We found a more recent version of this > >>>>>> specification. Because it appears that EAP will continue to be > >>>>>> mentioned in subsequent versions of this paper, may we update this > >>>>>> listing as follows? > >>>>>> > >>>>>> Original: > >>>>>> [TS133.501] > >>>>>> ETSI, "5G; Security architecture and procedures for 5G > >>>>>> System - TS 133 501 V15.2.0 (2018-10)", 2018. > >>>>>> > >>>>>> Suggested: > >>>>>> [TS133.501] > >>>>>> ETSI, "5G; Security architecture and procedures for 5G > >>>>>> System - TS 133 501 V18.9.0", April 2025, > >>>>>> https://urldefense.com/v3/__https://www.etsi.org/deliver/etsi_ts/133500_133599/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH47PGG_Jw$ > >>>>>> 133501/18.09.00_60/ts_133501v180900p.pdf --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] The suggestion is ok and very welcome. Thank you. > >>>>> > >>>>> > >>>>> > >>>>>> 38) <!-- [rfced] [ZigbeeIP]: We could not find this document number. > >>>>>> We also found that > >>>>>> <https://urldefense.com/v3/__https://www.zigbee.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4xoZxesQ$ > >>>>>> > steers to > >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ > >>>>>> >. When we searched > >>>>>> <https://urldefense.com/v3/__https://csa-iot.org/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5J3ax9bw$ > >>>>>> > for > >>>>>> the number 095023r34, the result was "Nothing found, please try > >>>>>> adjusting your search." > >>>>>> > >>>>>> Should a different paper be listed here and cited in Appendices B and > >>>>>> C.5.1? > >>>>>> > >>>>>> Original: > >>>>>> [ZigbeeIP] Zigbee Alliance, "ZigBee IP Specification (Zigbee Document > >>>>>> 095023r34)", 2014. --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] Certainly, this seems to be an old reference. We have other > >>>>> examples, the best course of action would be to remove this reference > >>>>> and the associated text. > >>>>> Forced removal can be done by sending new specific key material to the > >>>>> devices that still belong to the network, excluding the removed device, > >>>>> following a model similar to CoJP for 6TiSCH [RFC9031] or Zigbee IP > >>>>> [ZigbeeIP]. > >>>>> – > >>>>> Another example would be when a shared Network Key is required by the > >>>>> devices that join a network. An example of this Network Key can be > >>>>> found in Zigbee IP [ZigbeeIP] or the THREAD protocol [THREAD]. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>>> 39) <!-- [rfced] We found a newer version (1.4.0) of the Thread > >>>>>> specification. As the citation in Appendix B is general in nature, > >>>>>> may we update this listing as suggested below? > >>>>>> > >>>>>> Original: > >>>>>> [THREAD] Thread Group, "Thread specification 1.3", 2023. > >>>>>> > >>>>>> Suggested: > >>>>>> [THREAD] Kumar, S. and E. Dijk, "Thread 1.4 Features White Paper", > >>>>>> September 2024, > >>>>>> <https://urldefense.com/v3/__https://www.threadgroup.org/Portals/0/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7aZUQuhA$ > >>>>>> Documents/ > >>>>>> Thread_1.4_Features_White_Paper_September_2024.pdf>. --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] The suggestion is ok and welcome. Thank you. > >>>>> > >>>>> > >>>>> > >>>>>> 40) <!-- [rfced] Figure 9: > >>>>>> > >>>>>> a) Please note that we changed "hanshake" to "handshake". However, > >>>>>> in the HTML and PDF output files, the space after the "e" in > >>>>>> "hanshake" was removed in the process. We cannot determine where in > >>>>>> the SVG a coordinate should be modified to correct the spacing. > >>>>>> Please correct the SVG in the edited copy of the XML. > >>>>>> > >>>>>> b) We see "down" arrows between MSK and DTLS_PSK in the ASCII art > >>>>>> for this figure, but they do not appear in the SVG. If you would > >>>>>> like to add the arrows in the SVG, please correct the SVG in the > >>>>>> edited copy of the XML. > >>>>>> > >>>>>> c) We see "(Protected with (D)TLS)" in the ASCII art but > >>>>>> "Protected with (D)TLS" in the SVG. If you prefer the parentheses, > >>>>>> please correct the SVG in the edited copy of the XML. If you prefer > >>>>>> that the parentheses be removed, let us know, and we will update the > >>>>>> ASCII art accordingly. --> > >>>>>> > >>>>>> > >>>>> [Authors] New figure in rfc9820_modified.xml solves these issues. > >>>>> Also, for consistency, in Figure 3 there were no arrows indicating key > >>>>> derivation, we also updated that Figure in the xml file. > >>>>> > >>>>> > >>>>> > >>>>>> 41) <!-- [rfced] Appendix A: > >>>>>> > >>>>>> a) As it appears that "Steps 1 and 2" here refer to Steps 1 and 2 in > >>>>>> Figure 8 (as opposed to Steps 1 and 2 in Figure 3), may we add a > >>>>>> citation for Figure 8 for ease of the reader? > >>>>>> > >>>>>> If the suggested text is not correct, please also clarify "if DTLS > >>>>>> wants to be used". > >>>>>> > >>>>>> Original: > >>>>>> To simplify the design in CoAP-EAP, the KDF hash algorithm > >>>>>> can be included in the list of cipher suites exchanged in Step 1 and > >>>>>> Step 2 if DTLS wants to be used instead of OSCORE. > >>>>>> > >>>>>> Suggested: > >>>>>> To simplify the design in CoAP-EAP, the KDF hash algorithm > >>>>>> can be included in the list of cipher suites exchanged in Steps 1 and > >>>>>> 2 (Figure 8) if one wants to use DTLS instead of OSCORE. > >>>>>> > >>>>>> > >>>>> [Authors] The suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> b) Should "(RID-C) (RID-I)" be "RID-C || RID-I" per Appendix A.1? > >>>>>> > >>>>>> Original: > >>>>>> For the same > >>>>>> reason, the PSK identity is derived from (RID-C) (RID-I) as defined > >>>>>> in Appendix A.1. --> > >>>>>> > >>>>>> > >>>>> [Authors] Yes, this is correct. "(RID-C) (RID-I)" should be "RID-C || > >>>>> RID-I" > >>>>> > >>>>> > >>>>> > >>>>>> 42) <!-- [rfced] Appendix A: Should "considered" be "supported" in this > >>>>>> sentence, along the lines of "The other supported and negotiated > >>>>>> cipher suites are the following" as seen in Section 6.1? > >>>>>> > >>>>>> Original: > >>>>>> The hash algorithms considered are the following: > >>>>>> > >>>>>> * 5) TLS_SHA256 > >>>>>> > >>>>>> * 6) TLS_SHA384 > >>>>>> > >>>>>> * 7) TLS_SHA512 > >>>>>> > >>>>>> Possibly: > >>>>>> The following hash algorithms are supported: > >>>>>> > >>>>>> * 5) TLS_SHA256 > >>>>>> > >>>>>> * 6) TLS_SHA384 > >>>>>> > >>>>>> * 7) TLS_SHA512 --> > >>>>>> > >>>>>> > >>>>> [Authors] Following the previous issue (point 25) > >>>>> Proposed text. > >>>>> The following hash algorithms are considered in case the specification > >>>>> includes DTLS support in the future (TLS_SHA256,TLS_SHA384,TLS_SHA512) > >>>>> > >>>>> > >>>>> > >>>>>> 43) <!-- [rfced] Appendix A.1: Because the other equations in this > >>>>>> document don't end in periods, we removed the period from the end of > >>>>>> this equation. Please let us know any concerns. > >>>>>> > >>>>>> Original: > >>>>>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length). > >>>>>> > >>>>>> Currently: > >>>>>> DTLS PSK = KDF(MSK, "CoAP-EAP DTLS PSK", length) --> > >>>>>> > >>>>>> > >>>>> [Authors] The current proposed correction is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 44) <!-- [rfced] Appendix B: Because "PSK" stands for "Pre-Shared Key", > >>>>>> should "a shared key PSK" be "a PSK"? > >>>>>> > >>>>>> Original: > >>>>>> Similarly, to the example of Appendix A.1, where a shared key PSK for > >>>>>> DTLS is derived, it is possible to provide key material to different > >>>>>> link-layers after the CoAP-EAP authentication is complete. --> > >>>>>> > >>>>>> > >>>>> [Authors] You are correct. "a shared key PSK" should be "a PSK" > >>>>> > >>>>> > >>>>> > >>>>>> 45) <!-- [rfced] Appendix B: This sentence was difficult to follow. > >>>>>> We updated it as noted below. If this is incorrect, please clarify > >>>>>> the text. > >>>>>> > >>>>>> Original: > >>>>>> How a particular link-layer technology uses the MSK to derive further > >>>>>> key material for protecting the link-layer or use the OSCORE > >>>>>> protection to distribute key material is out of the scope of this > >>>>>> document. > >>>>>> > >>>>>> Currently (changed "uses the MSK ... or use the OSCORE protection" to > >>>>>> "uses the MSK ... or uses OSCORE protection"): > >>>>>> How a particular link-layer technology uses the MSK to derive further > >>>>>> key material for protecting the link layer or uses OSCORE protection > >>>>>> to distribute key material is outside the scope of this document. --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 46) <!-- [rfced] Appendix C: "EAP peers (A and B), which are EAP peers. > >>>>>> They are the EAP peers." appeared to be some unintentionally repeated > >>>>>> text. We removed the extra text as noted below. If some additional > >>>>>> information for this bullet item was intended (for example, as was > >>>>>> done for the "EAP authenticator (C)" and "AAA server (AAA)" bullet > >>>>>> items), please provide the information. > >>>>>> > >>>>>> Original: > >>>>>> * 2 EAP peers (A and B), which are EAP peers. They are the EAP > >>>>>> peers. > >>>>>> > >>>>>> Currently: > >>>>>> * Two EAP peers (A and B). --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 47) <!-- [rfced] Appendix C: "the EAP authenticator acts as an EAP > >>>>>> authenticator" read oddly and was difficult to follow. We updated > >>>>>> this sentence as noted below. If this update is incorrect, please > >>>>>> clarify the text. > >>>>>> > >>>>>> Original: > >>>>>> Here, the EAP authenticator acts as an EAP authenticator in pass- > >>>>>> through mode. > >>>>>> > >>>>>> Currently: > >>>>>> Here, the EAP authenticator is operating in pass- > >>>>>> through mode. --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 48) <!-- [rfced] Appendix C: This sentence did not parse. We updated it > >>>>>> as noted below. If this is incorrect, please clarify "... methods > >>>>>> might need to be used (...) being able to ...". > >>>>>> > >>>>>> Original: > >>>>>> With varied EAP peers and > >>>>>> networks, more lightweight authentication methods might need to be > >>>>>> used (e.g., EAP-NOOB[RFC9140], EAP-AKA'[RFC5448], EAP-PSK[RFC4764], > >>>>>> EAP-EDHOC[I-D.ietf-emu-eap-edhoc], etc.) being able to adapt to > >>>>>> different types of devices according to organization policies or > >>>>>> devices capabilities. > >>>>>> > >>>>>> Currently: > >>>>>> With varied EAP peers and > >>>>>> networks, authentication methods that are more lightweight (e.g., > >>>>>> EAP-NOOB [RFC9140], EAP-AKA' [RFC5448], EAP-PSK [RFC4764], EAP-EDHOC > >>>>>> [EAP-EDHOC], etc.) and are able to adapt to different types of > >>>>>> devices according to organization policies or device capabilities > >>>>>> might need to be used. --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>>> 49) <!-- [rfced] Appendix C.1: Does "while" in this sentence mean "at > >>>>>> the same time as" or "as long as" (per the "as long as the key > >>>>>> material is still valid" phrase in the "It is worth noting that the > >>>>>> first phase ..." paragraph)? > >>>>>> > >>>>>> Original: > >>>>>> This access can be repeated without contacting the EAP > >>>>>> authenticator, while the credentials given to A are still valid. --> > >>>>>> > >>>>>> > >>>>> [Authors] It means "as long as". > >>>>> > >>>>> > >>>>> > >>>>>> 50) <!-- [rfced] Appendix C.1: We had trouble following the meaning of > >>>>>> "the first phase with CoAP-EAP". If the suggested text is not > >>>>>> correct, please provide clarifying text. > >>>>>> > >>>>>> Original: > >>>>>> It is worth noting that the first phase with CoAP-EAP is required to > >>>>>> join the EAP authenticator C's domain. > >>>>>> > >>>>>> Suggested: > >>>>>> It is worth noting that to join EAP authenticator C's domain, the > >>>>>> first phase (authentication via CoAP-EAP) is required. --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>>> 51) <!-- [rfced] Appendix C.2: > >>>>>> > >>>>>> a) Should "AKA" be "AKA'", as used elsewhere in this document? > >>>>>> > >>>>>> Original: > >>>>>> A device (A) of the domain acme.org, which uses a specific kind of > >>>>>> credential (e.g., AKA) and intends to join the um.es domain. > >>>>>> > >>>>>> > >>>>> [Authors] This clarification adds more confusion than without it. > >>>>> Please leave it as follows > >>>>> > >>>>> A device (A) of the domain acme.org, which uses a specific kind of > >>>>> credential (e.g., AKA) and intends to join the um.es domain. > >>>>> > >>>>> > >>>>>> b) This sentence does not parse. It appears that some words are > >>>>>> missing. Please clarify "Through the local AAA server communicate > >>>>>> with the home AAA server ...". > >>>>>> > >>>>>> Original: > >>>>>> Through the local AAA server > >>>>>> communicate with the home AAA server to complete the authentication > >>>>>> and integrate the device as a trustworthy entity into the domain of > >>>>>> EAP authenticator C. --> > >>>>>> > >>>>>> > >>>>> [Authors]The text hopefully is clearer as follows: > >>>>> Then, the local AAA server communicates with the home AAA server to > >>>>> complete the authentication. This way, the device can be considered as > >>>>> a trustworthy entity within the domain of the EAP authenticator C > >>>>> > >>>>> > >>>>> > >>>>>> 52) <!-- [rfced] Appendix C.5.1: We corrected the incomplete > >>>>>> "Where can ..." sentence as follows. If this change is not correct, > >>>>>> please provide clarifying text. > >>>>>> > >>>>>> Original (the previous sentence is included for context): > >>>>>> For > >>>>>> example, in IEEE 802.15.4 networks, a new KMP ID can be defined to > >>>>>> add such support in the case of IEEE 802.15.9 [ieee802159]. Where > >>>>>> can be assumed that the device has at least a link-layer IPv6 > >>>>>> address. > >>>>>> > >>>>>> Currently (now one sentence that includes the expansion for "KMP"): > >>>>>> For > >>>>>> example, in IEEE 802.15.4 networks, a new Key Management Protocol > >>>>>> (KMP) ID can be defined to add such support in the case of IEEE > >>>>>> 802.15.9 [IEEE802159], where it can be assumed that the device has at > >>>>>> least a link-layer IPv6 address. --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 53) <!-- [rfced] Appendix C.5.1: Per the phrase "entity (proxy) that is > >>>>>> already part of the network (already shares key material and > >>>>>> communicates through a secure channel with the authenticator)" in the > >>>>>> next paragraph of this section and per Figure 10, we updated this > >>>>>> sentence accordingly. If this is incorrect, please clarify what > >>>>>> communicates through a secure channel. > >>>>>> > >>>>>> Original: > >>>>>> In the case a proxy participates in CoAP- > >>>>>> EAP, it will be because it is already a trustworthy entity within the > >>>>>> domain, which communicates through a secure channel with the EAP > >>>>>> authenticator, as illustrated by Figure 10. > >>>>>> > >>>>>> Currently: > >>>>>> In the case that a proxy participates in > >>>>>> CoAP-EAP, it will be because it is already a trustworthy entity > >>>>>> within the domain and communicates through a secure channel with the > >>>>>> EAP authenticator, as illustrated by Figure 10. --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. > >>>>> > >>>>> > >>>>> > >>>>>> 54) <!-- [rfced] Appendix C.5.1: This paragraph had several issues: > >>>>>> This section (Appendix C.5.1) cited itself, and in the second > >>>>>> sentence, "As mentioned, either ..." was unclear. Also, the > >>>>>> second sentence was incomplete. Please review all of our updates > >>>>>> carefully, and let us know if anything is incorrect. > >>>>>> > >>>>>> (Side note: We cited Section 3.6 here because although Section 3.1 > >>>>>> mentions both direct links and linking via a proxy, it doesn't > >>>>>> provide any descriptive text.) > >>>>>> > >>>>>> Original: > >>>>>> Thus, the EAP peer follows the same process described in > >>>>>> Appendix C.5.1 to perform the authentication. As mentioned, either > >>>>>> with a direct link to the EAP authenticator, or through an > >>>>>> intermediary entity (proxy) that is already part of the network > >>>>>> (already shares key material and communicates through a secure > >>>>>> channel with the authenticator) and can aid in running CoAP-EAP. > >>>>>> > >>>>>> Currently (the direct connection is mentioned in the previous > >>>>>> paragraph, so we did not mention it again here): > >>>>>> If the EAP peer cannot connect to the EAP authenticator directly, > >>>>>> the EAP peer can follow the same process as that described in > >>>>>> Section 3.6 to perform the authentication (i.e., can connect via > >>>>>> an intermediary entity (proxy) that is already part of the network > >>>>>> (already shares key material and communicates through a secure > >>>>>> channel with the authenticator) and can aid in running CoAP-EAP). --> > >>>>>> > >>>>>> > >>>>> [Authors] The currently suggested text is ok. The only change would be > >>>>> to set proxy as example. > >>>>> … an intermediary entity (e.g., proxy) that is already part of the > >>>>> network > >>>>> > >>>>> > >>>>> > >>>>>> 55) <!-- [rfced] Figure 10: We see "(security association)" in the > >>>>>> ASCII > >>>>>> art but "security association" in the SVG. If you prefer the > >>>>>> parentheses, please correct the SVG in the edited copy of the XML. > >>>>>> If you prefer that the parentheses be removed, let us know, and we > >>>>>> will update the ASCII art accordingly. --> > >>>>>> > >>>>>> > >>>>> [Authors] it is ok without parenthesis. > >>>>> > >>>>> > >>>>> > >>>>>> 56) <!-- [rfced] Please review the "Inclusive Language" portion of > >>>>>> the online Style Guide at > >>>>>> <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7Wcxz1GQ$ > >>>>>> >, > >>>>>> and let us know if any changes are needed. Updates of this nature > >>>>>> typically result in more precise language, which is helpful for > >>>>>> readers. > >>>>>> > >>>>>> For example, please consider whether the following should be updated: > >>>>>> Master Session Key, Master Secret, Master Salt, Master Key --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] These are the same terms used in the EAP [RFC] standard and > >>>>> OSCORE standard [RFC] from which this work depends. It is needed to > >>>>> understand the terminology to which we refer. > >>>>> > >>>>> > >>>>>> 57) <!-- [rfced] Please let us know if any changes are needed for the > >>>>>> following: > >>>>>> > >>>>>> a) The following terms were used inconsistently in this document. > >>>>>> We chose to use the latter forms. Please let us know any objections. > >>>>>> > >>>>>> AAA Server / AAA server (per post-6000 published RFCs) > >>>>>> > >>>>>> > >>>>> [AUTHORS] AAA server > >>>>> > >>>>>> Client registration (in running text) / > >>>>>> client registration (per RFC 9200) > >>>>>> > >>>>>> > >>>>> [AUTHORS] client registration > >>>>> > >>>>>> b) The following terms appear to be used inconsistently in this > >>>>>> document. Please let us know which form is preferred. > >>>>>> > >>>>>> "a/eap/1" (the URI for the first resource would be "a/eap/1") / > >>>>>> '/a/eap/1' > >>>>>> > >>>>>> > >>>>> [AUTHORS] "a/eap/1" > >>>>> > >>>>>> CBOR Object / CBOR object > >>>>>> > >>>>> [AUTHORS] CBOR Object > >>>>> > >>>>>> DTLS PSK / DTLS_PSK > >>>>>> > >>>>> [AUTHORS] DTLS_PSK > >>>>> > >>>>>> EAP Failure / EAP failure > >>>>>> (will send an EAP Failure, sends an EAP failure) > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP Failure > >>>>> > >>>>>> EAP-Request/Identity / EAP Req/Id / EAP-Req/Id > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP-Request/Identity > >>>>> > >>>>> > >>>>>> EAP response / EAP Response (used generally in text, e.g., > >>>>>> "an EAP response", "an EAP Response") > >>>>>> (We also see "EAP Response header" in Section 7.1.) > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP Response > >>>>> > >>>>> > >>>>> > >>>>>> EAP-Response/Identity / EAP Resp/Id / EAP Response/Id > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP-Response/Identity > >>>>> > >>>>> > >>>>> > >>>>>> EAP-X-Req (text) / EAP-X Req (Figure 3) > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP-X-Req > >>>>> We updated the figures so they are consistent > >>>>> > >>>>>> EAP-X-Resp (text) / EAP-X Resp (Figures 3 and 9) > >>>>>> > >>>>>> > >>>>> [AUTHORS] EAP-X-Resp > >>>>> > >>>>> > >>>>> > >>>>>> Network Key / network key > >>>>>> > >>>>>> > >>>>> [AUTHORS] Network Key > >>>>> > >>>>> > >>>>> > >>>>>> Option(s) / option(s) (e.g., "Location-Path Option", > >>>>>> "Location-Path and/or Location-Query Options", > >>>>>> "Location-Path or Location-Query options", > >>>>>> "Location-Path (and/or Location-Query) Options", > >>>>>> "Location-Path (and/or Location-Query) options") > >>>>>> > >>>>>> > >>>>> [AUTHORS] Option(s) > >>>>> > >>>>>> OSCORE Security Context / OSCORE security context > >>>>>> > >>>>>> > >>>>> [AUTHORS] OSCORE Security Context > >>>>> > >>>>> > >>>>>> Session-Lifetime / Session-lifetime / Session Lifetime / > >>>>>> session lifetime (in running text) > >>>>>> (Figure 3 and Table 4 use "Session-Lifetime".) > >>>>>> > >>>>>> > >>>>> [AUTHORS] Session-Lifetime > >>>>> > >>>>> > >>>>> > >>>>>> c) Should quoting and spacing be made consistent? For example: > >>>>>> > >>>>>> Quoting: '2.01 Created' / "2.01 Created" > >>>>>> > >>>>> [Authors] ‘2.01 Created’ > >>>>> > >>>>>> Spacing: Payload(EAP-X Resp) / Payload (EAP-X Resp) > >>>>>> > >>>>> [Authors] without spacing between be parenthesis > >>>>> > >>>>>> d) Should spacing after step numbers in figures be made > >>>>>> consistent? For example: > >>>>>> > >>>>>> ... > >>>>>> 0)| No-Response | > >>>>>> ... (Figure 3) > >>>>>> > >>>>>> ... > >>>>>> 0) | No-Response | > >>>>>> ... (Figure 5) --> > >>>>>> > >>>>>> > >>>>>> > >>>>> [Authors] Without spacing is ok. > >>>>> > >>>>> > >>>>>> Thank you. > >>>>>> > >>>>>> RFC Editor/lb/rv > >>>>>> > >>>>>> > >>>>> Thank you very much. > >>>>> > >>>>> > >>>>>> On Jul 18, 2025, at 10:46 AM, rfc-edi...@rfc-editor.org wrote: > >>>>>> > >>>>>> *****IMPORTANT***** > >>>>>> > >>>>>> Updated 2025/07/18 > >>>>>> > >>>>>> RFC Author(s): > >>>>>> -------------- > >>>>>> > >>>>>> Instructions for Completing AUTH48 > >>>>>> > >>>>>> Your document has now entered AUTH48. Once it has been reviewed and > >>>>>> approved by you and all coauthors, it will be published as an RFC. > >>>>>> If an author is no longer available, there are several remedies > >>>>>> available as listed in the FAQ > >>>>>> (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4mckAP4A$ > >>>>>> ). > >>>>>> > >>>>>> You and you coauthors are responsible for engaging other parties > >>>>>> (e.g., Contributors or Working Group) as necessary before providing > >>>>>> your approval. > >>>>>> > >>>>>> Planning your review > >>>>>> --------------------- > >>>>>> > >>>>>> Please review the following aspects of your document: > >>>>>> > >>>>>> * RFC Editor questions > >>>>>> > >>>>>> Please review and resolve any questions raised by the RFC Editor > >>>>>> that have been included in the XML file as comments marked as > >>>>>> follows: > >>>>>> > >>>>>> <!-- [rfced] ... --> > >>>>>> > >>>>>> These questions will also be sent in a subsequent email. > >>>>>> > >>>>>> * Changes submitted by coauthors > >>>>>> > >>>>>> Please ensure that you review any changes submitted by your > >>>>>> coauthors. We assume that if you do not speak up that you > >>>>>> agree to changes submitted by your coauthors. > >>>>>> > >>>>>> * Content > >>>>>> > >>>>>> Please review the full content of the document, as this cannot > >>>>>> change once the RFC is published. Please pay particular attention to: > >>>>>> - IANA considerations updates (if applicable) > >>>>>> - contact information > >>>>>> - references > >>>>>> > >>>>>> * Copyright notices and legends > >>>>>> > >>>>>> Please review the copyright notice and legends as defined in > >>>>>> RFC 5378 and the Trust Legal Provisions > >>>>>> (TLP – > >>>>>> https://urldefense.com/v3/__https://trustee.ietf.org/license-info__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5D1hB7LA$ > >>>>>> ). > >>>>>> > >>>>>> * Semantic markup > >>>>>> > >>>>>> Please review the markup in the XML file to ensure that elements of > >>>>>> content are correctly tagged. For example, ensure that <sourcecode> > >>>>>> and <artwork> are set correctly. See details at > >>>>>> <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4qmIsbLQ$ > >>>>>> >. > >>>>>> > >>>>>> * Formatted output > >>>>>> > >>>>>> Please review the PDF, HTML, and TXT files to ensure that the > >>>>>> formatted output, as generated from the markup in the XML file, is > >>>>>> reasonable. Please note that the TXT will have formatting > >>>>>> limitations compared to the PDF and HTML. > >>>>>> > >>>>>> > >>>>>> Submitting changes > >>>>>> ------------------ > >>>>>> > >>>>>> To submit changes, please reply to this email using ‘REPLY ALL’ as all > >>>>>> the parties CCed on this message need to see your changes. The parties > >>>>>> include: > >>>>>> > >>>>>> * your coauthors > >>>>>> > >>>>>> * rfc-edi...@rfc-editor.org (the RPC team) > >>>>>> > >>>>>> * other document participants, depending on the stream (e.g., > >>>>>> IETF Stream participants are your working group chairs, the > >>>>>> responsible ADs, and the document shepherd). > >>>>>> > >>>>>> * auth48archive@rfc-editor.org, which is a new archival mailing list > >>>>>> to preserve AUTH48 conversations; it is not an active discussion > >>>>>> list: > >>>>>> > >>>>>> * More info: > >>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH73FBctPw$ > >>>>>> > >>>>>> * The archive itself: > >>>>>> https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH5RDfiTDg$ > >>>>>> > >>>>>> * Note: If only absolutely necessary, you may temporarily opt out > >>>>>> of the archiving of messages (e.g., to discuss a sensitive matter). > >>>>>> If needed, please add a note at the top of the message that you > >>>>>> have dropped the address. When the discussion is concluded, > >>>>>> auth48archive@rfc-editor.org will be re-added to the CC list and > >>>>>> its addition will be noted at the top of the message. > >>>>>> > >>>>>> You may submit your changes in one of two ways: > >>>>>> > >>>>>> An update to the provided XML file > >>>>>> — OR — > >>>>>> An explicit list of changes in this format > >>>>>> > >>>>>> Section # (or indicate Global) > >>>>>> > >>>>>> OLD: > >>>>>> old text > >>>>>> > >>>>>> NEW: > >>>>>> new text > >>>>>> > >>>>>> You do not need to reply with both an updated XML file and an explicit > >>>>>> list of changes, as either form is sufficient. > >>>>>> > >>>>>> We will ask a stream manager to review and approve any changes that > >>>>>> seem > >>>>>> beyond editorial in nature, e.g., addition of new text, deletion of > >>>>>> text, > >>>>>> and technical changes. Information about stream managers can be found > >>>>>> in > >>>>>> the FAQ. Editorial changes do not require approval from a stream > >>>>>> manager. > >>>>>> > >>>>>> > >>>>>> Approving for publication > >>>>>> -------------------------- > >>>>>> > >>>>>> To approve your RFC for publication, please reply to this email stating > >>>>>> that you approve this RFC for publication. Please use ‘REPLY ALL’, > >>>>>> as all the parties CCed on this message need to see your approval. > >>>>>> > >>>>>> > >>>>>> Files > >>>>>> ----- > >>>>>> > >>>>>> The files are available here: > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.xml__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH61uj9KFA$ > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH46vzPMGQ$ > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.pdf__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH4VnhbREw$ > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820.txt__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH7CGA_kaw$ > >>>>>> > >>>>>> Diff file of the text: > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-diff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6IAS29qA$ > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-rfcdiff.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6sl8fsTg$ > >>>>>> (side by side) > >>>>>> > >>>>>> Diff of the XML: > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9820-xmldiff1.html__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH6VqyXnzw$ > >>>>>> > >>>>>> > >>>>>> Tracking progress > >>>>>> ----------------- > >>>>>> > >>>>>> The details of the AUTH48 status of your document are here: > >>>>>> https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9820__;!!D9dNQwwGXtA!TbrbqBQ-ZV4q1lZ-2XZijFJaaOonPT3t5f_RiDDltidPVxX0OgC5zFBsKRUScKfq0HsVOUZdbzjVJ122AH41wCjt6w$ > >>>>>> > >>>>>> Please let us know if you have any questions. > >>>>>> > >>>>>> Thank you for your cooperation, > >>>>>> > >>>>>> RFC Editor > >>>>>> > >>>>>> -------------------------------------- > >>>>>> RFC9820 (draft-ietf-ace-wg-coap-eap-15) > >>>>>> > >>>>>> Title : EAP-based Authentication Service for CoAP > >>>>>> Author(s) : R. Marin-Lopez, D. Garcia-Carrillo > >>>>>> WG Chair(s) : Loganaden Velvindron, Tim Hollebeek > >>>>>> > >>>>>> Area Director(s) : Deb Cooley, Paul Wouters > >>>>>> > >>>>>> > >>>>>> > >>>>>> > >>>>> -- > >>>>> Dan García Carrillo > >>>>> --------------------- > >>>>> Associate Professor > >>>>> Dpto. de Informática, Área de Telemática, Universidad de Oviedo > >>>>> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón > >>>>> Dpcho. 2.7.8 - Edificio Polivalente > >>>>> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es > >>>>> <rfc9820_modified.xml> > >>>>> > >>> -- > >>> Dan García Carrillo > >>> --------------------- > >>> Associate Professor > >>> Dpto. de Informática, Área de Telemática, Universidad de Oviedo > >>> Escuela Politécnica de Ingeniería, C.P. 33204, Campus de Viesques, Gijón > >>> Dpcho. 2.7.8 - Edificio Polivalente > >>> Tel.: +34 985182654 (Ext. 2654) | email: garcia...@uniovi.es > -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org