Dear Roman Danyliw,

Thanks for your review in advance.

The spec, NAP 1.0 describes the basic mechanism (i.e., mechanisms for 
cryptographically authenticated NFC connections) for applications needing an 
authentication and/or a secured data transfer. NAP 1.0 supports three 
mechanisms: (1) Establishment of a secure channel between two NFC devices to 
prevent eavesdropping. (2) The authentication process allows NFC devices to 
build up trust with each other for NFC communication. (3) The bonding process 
allows two NFC devices to be paired together and establish a common secret key 
during a registration phase.

LLCP 1.4 uses NAP 1.0 for secure data transfer, replacing parts of the secure 
data transfer defined by LLCP 1.3 specification. I am sorry that it is not easy 
to provide NAP 1.0 spec at the moment. It is available in a charge for access 
that on the NFC forum website..  (here 
<https://members.nfc-forum.org/apps/group_public/document.php?document_id=39278>)

Best regards,
Younghwan Choi

-----------------------------------------------
YOUNGHWAN CHOI, Ph.D.
Principal Researcher, PEC, ETRI
Tel +82-42-860-1429   Fax +82-42-860-5404 
Email  y...@etri.re.kr

> On Dec 28, 2022, at 11:59 PM, Roman Danyliw via Datatracker 
> <nore...@ietf.org> wrote:
> 
> Roman Danyliw has entered the following ballot position for
> draft-ietf-6lo-nfc-19: Discuss
> 
> When responding, please keep the subject line intact and reply to all
> email addresses included in the To and CC lines. (Feel free to cut this
> introductory paragraph, however.)
> 
> 
> Please refer to 
> https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions/ 
> for more information about how to handle DISCUSS and COMMENT positions.
> 
> 
> The document, along with other ballot positions, can be found here:
> https://datatracker.ietf.org/doc/draft-ietf-6lo-nfc/
> 
> 
> 
> ----------------------------------------------------------------------
> DISCUSS:
> ----------------------------------------------------------------------
> 
> (Preliminary ballot from an incomplete review of the document, but shared here
> for early awareness)
> 
> Multiple prior DISCUSes were filed on the basis of concerns that the base
> normative references were not available.  In response, the "NFC LLC v1.4"
> specification was shared. However, it appears additional normative references
> are needed to evaluate the security claims of the protocol (NFC LLC v1.4).
> 
> Section 7 of this I-D says:
> 
>   Ad-hoc secure data transfer can be established between two
>   communication parties without any prior knowledge of the
>   communication partner.  Ad-hoc secure data transfer can be vulnerable
>   to Man-In-The-Middle (MITM) attacks.  Authenticated secure data
>   transfer provides protection against Man-In-The-Middle (MITM)
>   attacks.  In the initial bonding step, the two communicating parties
>   store a shared secret along with a Bonding Identifier.  For all
>   subsequent interactions, the communicating parties re-use the shared
>   secret and compute only the unique encryption key for that session.
>   Secure data transfer is based on the cryptographic algorithms defined
>   in the NFC Authentication Protocol (NAP).
> 
> This text is a cut-and-paste verbatim from Section 3.2.5 of NFC Forum LLC
> specification previously shared as part of the last telechat.  However the NAP
> is defined in yet another NFC Forum document.  How does one access that?
> 



_______________________________________________
6lo mailing list
6lo@ietf.org
https://www.ietf.org/mailman/listinfo/6lo

Reply via email to