New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
use automated key rotation due to AES-CCM/BCP107 #8
Comments
I don't get it. This is about using AES-CCM between a client and itself? |
The git history was nuked in March, but the I-D history shows it came in in -03. |
@thomas-fossati -- do you remember what you had in mind here? Archived-At: https://mailarchive.ietf.org/arch/msg/core/tVZJ7iCUTtn1sSLeFcicagCB4eg |
https://github.com/ektrah/I-D/commit/791b83807aeee2b5af8fb6de8b4f5f8da3ac6425 (The draft is older than the https://github.com/core-wg/stateless repository.) |
This should say "automated key rotation" rather than "automated key management". Sorry for the confusion! |
…entirely a local consideration, close #8
doc> provides the above uniqueness guarantee. Additionally, since it can
doc> be difficult to use AES-CCM securely when using statically configured
doc> keys, implementations should use automated key management [RFC4107].
[[TODO]]
The text was updated successfully, but these errors were encountered: