On Sep 19, 2016 4:37 PM, "Thiago Macieira" <thiago.macieira at intel.com>
wrote:
>
> On segunda-feira, 19 de setembro de 2016 15:53:26 PDT Gregg Reynolds
wrote:
> > > It shouldn't be *supported*.
> > >
> > > It was used for a long time during development so that we could do a
> > > packet
> > > capture and use it to debug what was happening.
> >
> > Sorry, I am a bear of small brain.  do you mean it was used to disable
dtls
> > so that e.g. stuff captured by wireshark would not be encrypted?  was
there
> > more to it than that?
>
> Correct, it disabled encryption and the ACLs, along with the
security-related
> resources that IoTivity implements on behalf of the application.

ok, thanks, I appreciate your patience. and will now presume to abuse it. ;)

as far as I can see, security is layered.  we have transport-level security
in dtls.  we need to be able to turn this off, for debugging.

then we have, further up in the stack, ACLs, creds, etc.  is there ever a
reason to turn these off? I don't see that they have anything to do with
lower-level encryption.  am I missing anything?

the problem as I see it is that SECURED=0/1 gloms together a bunch of stuff
that should not be glommed.

Howsabout this: there is no SECURED=0.  Upper-level security is always
enabled.  If you really need to debug stuff you do WITHOUT_DTLS or sth like
that - you can turn off transport-level encryption but that's all.

what am I missing?

gregg

>
> --
> Thiago Macieira - thiago.macieira (AT) intel.com
>   Software Architect - Intel Open Source Technology Center
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20160919/197768f6/attachment.html>

Reply via email to