Hi,

For message sizes you can find a comparision of EDHOC, TLS, TLS with RPK, and 
cTLS can be found in the document below. You would have to add the EAP(-TLS) 
request reponse layers.
https://datatracker.ietf.org/doc/draft-ietf-iotops-security-protocol-comparison/

Other important metrics for IoT devices are memory, code size, energy, cpu 
cycles, which are also lower. Code size does of course depend on what you want 
to support in addition to EAP-EDHOC. If you are a constrained device already 
supporting CBOR, COSE these can be reused for EDHOC. If you support EAP-TLS the 
only resuse in EAP-EDHOC would be the algorithms.

>If you can show that there is seemingly no way to get EAP-TLS (or anything 
>else)
I don’t know what you mean with anything else, but I think the EMU WG does 
likely not want to do changes to TLS. cTLS seems quite optimized, I that is a 
far as you come while not making larger changes that would invalidate the 
security proofs.

Cheers,
John

From: Alexander Clouter <alex+i...@coremem.com>
Date: Tuesday, 7 November 2023 at 18:04
To: John Mattsson <john.matts...@ericsson.com>
Cc: EMU WG <emu@ietf.org>
Subject: Re: [Emu] FW: New Version Notification for 
draft-ingles-eap-edhoc-05.txt
Hello,

On Thu, 28 Sep 2023, at 15:47, John Mattsson wrote:
>
> EDHOC is high level very similar to the TLS 1.3 handshake but has much
> smaller message sizes and is therefore useful in IoT. EAP-EDHOC is just
> EDHOC over EAP using the EAP-TLS request and response packet formats.

To help get me behind this it would be interesting to see comparisons made 
against existing EAP methods.

For example, how much smaller and better for your use case is EAP-EDHOC 
compared to:

 * plain vanilla flavoured EAP-TLS
 * why is NewSessionTicket (session resumption)
 * though a draft, make some predictions if there was a EAP-cTLS (based off 
draft-ietf-tls-ctls) implementation
 * what if RPK (RFC7250) was an option; draft-chen-emu-eap-tls-ibs attempted 
this but also lacked information on how much you gained by doing this
 * could "Trusted CA Indication" (RFC6066, section 6) help; though it probably 
would need adding to OpenSSL[1]

How much slimmer do you need EAP-TLS to be to make EAP-EDHOC no longer 
necessary? Or is the shape of it just completely inappropriate?

>From my perspective, I see work in the pipeline that could be called on to 
>trim EAP-TLS in a manner that would only require implementers to make tweaks 
>to their existing implementations.

If you can show that there is seemingly no way to get EAP-TLS (or anything 
else) to fit the bill, it would convince me that this is a good place to put my 
energy into.

Cheers

Alex

[1] 
https://protect2.fireeye.com/v1/url?k=31323334-501cfaf3-313273af-454445554331-0fe24c0b277e0f2f&q=1&e=1b3185be-29f0-47b3-8f30-b7b626dfd6eb&u=https%3A%2F%2Fgithub.com%2Fopenssl%2Fopenssl%2Fissues%2F3029
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to