Hi Rich,

M2M might be common TLS, but with something else at the application layer.  
I’ll give this example, but admittedly the terminology is confusing: there is 
another protocol that is called EtherNet/IP (here IP stands for Industrial 
Protocol, hence the concern about confusion). In this case this protocol is 
built upon TCP and UDP, but then above that there is a different protocol meant 
for machine to machine communication that will enable a number of industrial 
applications.  What we did in ODVA was to add TLS (and DTLS in some cases) to 
protect this communication.  This communication is often high speed and latency 
is a major concern.  So it is standard TLS, but rather than HTTP on top of the 
TLS, it is an Industrial Protocol.  Even if the device is “capable” of 
encryption, encrypting the data adds overhead and is unnecessary in some 
applications.  So capable might mean it can do encryption, but not at the 
speeds necessary for machine to machine I/O.

Thanks and Best Regards,

--Jack

From: Salz, Rich [mailto:rs...@akamai.com]
Sent: Tuesday, August 21, 2018 1:46 PM
To: Jack Visoky <jmvis...@ra.rockwell.com>; Salz, Rich 
<rsalz=40akamai....@dmarc.ietf.org>; Fries, Steffen <steffen.fr...@siemens.com>
Cc: ncamwing=40cisco....@dmarc.ietf.org; tls@ietf.org
Subject: Re: [TLS] EXTERNAL: Re: integrity only ciphersuites

Ø  I’m not sure if I’m following the question, but what was meant was that 
these ciphers are generally NOT used for browser access.  Machine to machine 
communication usually does not involve a browser.  Apologies if I’ve 
misunderstood the question.

You understood me.  So the devices (or rather at least some of them since they 
are splendiferous in their variances) do speak common TLS.  But not for M2M.  
That part confuses me, since “too small to encrypt” was a reason given.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to