Hi,

We feel that draft-ietf-lwig-security-protocol-comparison is getting quite 
ready now that the included protocols are published or at least stable.

We would love to have more examples of cTLS. Are there any more examples 
available? We currently included the example in the draft.

Review by people in the TLS WG would be great as the draft covers TLS 1.2, DTLS 
1.2, TLS 1.3, DTLS 1.3, and cTLS.

Cheers,
John

From: John Mattsson <john.matts...@ericsson.com>
Date: Sunday, 25 December 2022 at 20:19
To: l...@ietf.org <l...@ietf.org>
Subject: Re: New Version Notification for 
draft-ietf-lwig-security-protocol-comparison-06.txt
Hi,

We submitted a new version of draft-ietf-lwig-security-protocol-comparison. 
This document has been dormant for a while as several of the referenced 
protocols were not stable, which lead to a lot of work in earlier versions. All 
of the protocols now seem to be stable and published or close to being 
published. This version fixes all the comments we have received. We think it is 
close to being ready for WGLC.

This is obviously needed information for a lot of people. The draft already has 
17 citations.
https://scholar.google.com/scholar?hl=en&as_sdt=0,5&cluster=11841781769013384442

The need for compact formats and protocols has also gained attention outside of 
IoT. In the IAB workshop on Environmental Impact of Internet Applications and 
Systems, compact formats and protocols were discussed as a way to reduce the 
energy consumption of the Internet as a whole.
https://www.iab.org/activities/workshops/e-impact/

Changes in -06:

- Added more context to abstract and introduction
- Added high level comparison of the number of bytes in TLS 1.2 and TLS 1.3 
handshakes
- Added Compact TLS 1.3 (cTLS)
- Added some more clarification on (D)TLS choices
- Added text that CoAP needs to be added to the EDHOC figures to be directly 
comparable to DTLS.
- Added more DTLS and EDHOC alternatives to the summary table.
- Added ECDSA keys without point compression as that does not seem to be 
supported.
- Corrected DTLS calculation where 10 was used instead of 12 (thanks to Stephan 
Koch for reporting this)
- Updated DTLS 1.3 records to align with the RFC.
- Updated EDHOC numbers to align with latest drafts.
- Added numbers for Group OSCORE pairwise mode.
- Added that DTLS and OSCORE numbers might not be directly comparable as 
requirements on CoAP Token reuse are different.
- Changed names to Unicode
- Added SVG figures and tables with the help of aasvg

Cheers,
John Preuß Mattsson

From: internet-dra...@ietf.org <internet-dra...@ietf.org>
Date: Sunday, 25 December 2022 at 19:52
To: Mališa Vučinić <malisa.vuci...@inria.fr>, John Mattsson 
<john.matts...@ericsson.com>, Francesca Palombini 
<francesca.palomb...@ericsson.com>, John Mattsson <john.matts...@ericsson.com>, 
Malisa Vucinic <malisa.vuci...@inria.fr>
Subject: New Version Notification for 
draft-ietf-lwig-security-protocol-comparison-06.txt

A new version of I-D, draft-ietf-lwig-security-protocol-comparison-06.txt
has been successfully submitted by John Preuß Mattsson and posted to the
IETF repository.

Name:           draft-ietf-lwig-security-protocol-comparison
Revision:       06
Title:          Comparison of CoAP Security Protocols
Document date:  2022-12-25
Group:          lwig
Pages:          45
URL:            
https://www.ietf.org/archive/id/draft-ietf-lwig-security-protocol-comparison-06.txt
Status:         
https://datatracker.ietf.org/doc/draft-ietf-lwig-security-protocol-comparison/
Html:           
https://www.ietf.org/archive/id/draft-ietf-lwig-security-protocol-comparison-06.html
Htmlized:       
https://datatracker.ietf.org/doc/html/draft-ietf-lwig-security-protocol-comparison
Diff:           
https://author-tools.ietf.org/iddiff?url2=draft-ietf-lwig-security-protocol-comparison-06

Abstract:
   This document analyzes and compares the sizes of key exchange flights
   and the per-packet message size overheads when using different
   security protocols to secure CoAP.  Small message sizes are very
   important for reducing energy consumption, latency, and time to
   completion in constrained radio network such as Low-Power Wide Area
   Networks (LPWANs).  The analyzed security protocols are DTLS 1.2,
   DTLS 1.3, TLS 1.2, TLS 1.3, cTLS, EDHOC, OSCORE, and Group OSCORE.
   The DTLS and TLS record layers are analyzed with and without 6LoWPAN-
   GHC compression.  DTLS is analyzed with and without Connection ID.




The IETF Secretariat
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to