Thanks, Ludwig. Note that last paragraph of the new Operational Considerations
section at
https://tools.ietf.org/html/draft-ietf-ace-cwt-proof-of-possession-03#section-6
addresses this issue. In particular, the last sentence of the section talks
about the need to keep keys used in different contexts separate if there is
otherwise any chance of confusion.
I'll also note that for the constrained environments that ACE is addressing, I
expect that deployments with exactly one PoP key to be predominant use case.
In this use case, such confusion is impossible in the first place.
-- Mike
-----Original Message-----
From: Ace <[email protected]> On Behalf Of Ludwig Seitz
Sent: Tuesday, July 3, 2018 2:33 AM
To: 'ace' <[email protected]>
Subject: Re: [Ace] Key IDs ... RE: WGLC on
draft-ietf-ace-cwt-proof-of-possession-02
On 2018-07-03 11:31, Ludwig Seitz wrote:
>
> 6. Client B gets 2 from AS bound via the cnf claim to KID="A"
>
This should of course read:
Client B gets T2 from AS ...
/Ludwig
--
Ludwig Seitz, PhD
Security Lab, RISE SICS
Phone +46(0)70-349 92 51
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace
_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace