Make it clear that peers can do "active rekeying" and trigger KUDOS whenever they want.
It can be about the peer using the OSCORE Security Context to send a request and at that point noticing it has expired, or reached the key usage limits. But it can also be that a peer has a separate thread monitoring the state of its contexts and automatically triggers a rekeying when needed (or using a callback method called on expiration/reaching the limits)
Make it clear that peers can do "active rekeying" and trigger KUDOS whenever they want.
It can be about the peer using the OSCORE Security Context to send a request and at that point noticing it has expired, or reached the key usage limits. But it can also be that a peer has a separate thread monitoring the state of its contexts and automatically triggers a rekeying when needed (or using a callback method called on expiration/reaching the limits)