--- 1/draft-ietf-ace-dtls-authorize-08.txt 2019-12-18 08:14:11.773213442 -0800 +++ 2/draft-ietf-ace-dtls-authorize-09.txt 2019-12-18 08:14:11.817214567 -0800 @@ -1,24 +1,24 @@ ACE Working Group S. Gerdes Internet-Draft O. Bergmann Intended status: Standards Track C. Bormann -Expires: October 14, 2019 Universitaet Bremen TZI +Expires: June 20, 2020 Universitaet Bremen TZI G. Selander Ericsson AB L. Seitz - RISE - April 12, 2019 + Combitech + December 18, 2019 Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) - draft-ietf-ace-dtls-authorize-08 + draft-ietf-ace-dtls-authorize-09 Abstract This specification defines a profile of the ACE framework that allows constrained servers to delegate client authentication and authorization. The protocol relies on DTLS for communication security between entities in a constrained network using either raw public keys or pre-shared keys. A resource-constrained server can use this protocol to delegate management of authorization information to a trusted host with less severe limitations regarding processing @@ -32,21 +32,21 @@ Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at https://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." - This Internet-Draft will expire on October 14, 2019. + This Internet-Draft will expire on June 20, 2020. Copyright Notice Copyright (c) 2019 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents @@ -789,33 +789,33 @@ Reference: [RFC-XXXX] 10. References 10.1. Normative References [I-D.ietf-ace-cwt-proof-of-possession] Jones, M., Seitz, L., Selander, G., Erdtman, S., and H. Tschofenig, "Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)", draft-ietf-ace-cwt-proof-of- - possession-06 (work in progress), February 2019. + possession-11 (work in progress), October 2019. [I-D.ietf-ace-oauth-authz] Seitz, L., Selander, G., Wahlstroem, E., Erdtman, S., and H. Tschofenig, "Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 - Framework (ACE-OAuth)", draft-ietf-ace-oauth-authz-24 - (work in progress), March 2019. + Framework (ACE-OAuth)", draft-ietf-ace-oauth-authz-29 + (work in progress), December 2019. [I-D.ietf-ace-oauth-params] Seitz, L., "Additional OAuth Parameters for Authorization in Constrained Environments (ACE)", draft-ietf-ace-oauth- - params-05 (work in progress), March 2019. + params-07 (work in progress), December 2019. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, March 1997, . [RFC4279] Eronen, P., Ed. and H. Tschofenig, Ed., "Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)", RFC 4279, DOI 10.17487/RFC4279, December 2005, . @@ -911,16 +911,16 @@ Germany Phone: +49-421-218-63921 Email: cabo@tzi.org Goeran Selander Ericsson AB Email: goran.selander@ericsson.com Ludwig Seitz - RISE - Scheelevaegen 17 - Lund 223 70 + Combitech + Djaeknegatan 31 + Malmoe 211 35 Sweden - Email: ludwig.seitz@ri.se + Email: ludwig.seitz@combitech.se