core-wg / oscore-key-update

Other
0 stars 0 forks source link

Case when Different Security Context is used for request decryption and response encryption #58

Closed rikard-sics closed 1 year ago

rikard-sics commented 1 year ago

Add text on generic considerations for when changing the security context between request decryption and response encryption (in section 2.3.1).

Can take inspiration from Group OSCORE draft: In step 3, if the server is using a different Security Context for the response compared to what was used to verify the request (see Section 3.2), then the server MUST include its Sender Sequence Number as Partial IV in the response and use it to build the AEAD nonce to protect the response. This prevents the AEAD nonce from the request from being reused. https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-groupcomm-15#section-8.3

Also add a specific note that server should include PIV in Response 2 for KUDOS.

rikard-sics commented 1 year ago

This is something to mention in the KUDOS draft, another point that updates OSCORE.

marco-tiloca-sics commented 1 year ago

Closed by https://github.com/core-wg/oscore-key-update/commit/645a6d80866d54c2552d8c01ff0838be5c343b96