Add text on generic considerations for when changing the security context between request decryption and response encryption (in section 2.3.1).
Can take inspiration from Group OSCORE draft:
In step 3, if the server is using a different Security Context for the response compared to what was used to verify the request (see Section 3.2), then the server MUST include its Sender Sequence Number as Partial IV in the response and use it to build the AEAD nonce to protect the response. This prevents the AEAD nonce from the request from being reused.https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-groupcomm-15#section-8.3
Also add a specific note that server should include PIV in Response 2 for KUDOS.
Add text on generic considerations for when changing the security context between request decryption and response encryption (in section 2.3.1).
Can take inspiration from Group OSCORE draft: In step 3, if the server is using a different Security Context for the response compared to what was used to verify the request (see Section 3.2), then the server MUST include its Sender Sequence Number as Partial IV in the response and use it to build the AEAD nonce to protect the response. This prevents the AEAD nonce from the request from being reused. https://datatracker.ietf.org/doc/html/draft-ietf-core-oscore-groupcomm-15#section-8.3
Also add a specific note that server should include PIV in Response 2 for KUDOS.