On Thursday 18 June 2015 13:14:31 Light, John J wrote:
> 1.       If IoTivity stack communicates all secure traffic on 5684, which is
> not set with REUSEADDR, how does a second instance (or a non-IoTivity CoAP
> app) work on the same device?  With the described usage, the second
> instance (and other secure CoAP applications) will fail.  I don?t believe
> we have the right to gain exclusive use of the secure CoAP port.

I'm also interested in the answer for this. When talking to Ned about whether 
we could ever turn off the insecure ports, he said that we'll still need it for 
discovery, so I assumed that discovery happens over the unencrypted port.

He also indicated that discovery could be done over DTLS if we had group keys, 
but that is not yet a confirmed part of the security architecture.

PS: this does not affect onboarding.
-- 
Thiago Macieira - thiago.macieira (AT) intel.com
  Software Architect - Intel Open Source Technology Center

Reply via email to