Skip to content

Commit

Permalink
No need for DTLS client auth when DTLS+EDHOC for PoP
Browse files Browse the repository at this point in the history
  • Loading branch information
geonnave committed Oct 21, 2024
1 parent 3026f6e commit 251fd98
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion draft-ietf-lake-authz.md
Original file line number Diff line number Diff line change
Expand Up @@ -237,7 +237,7 @@ Some of the possible combinations of protocols to secure the connection between
| Secure channel between V and W | Proof-of-Possession from V to W | Type of CRED_V | EDHOC method used by V |
|--|--|--|--|
| [D]TLS 1.3 with mutual authentication, where V is the client and W is the server. | Provided by [D]TLS. | Restricted to types that are supported by both [D]TLS and EDHOC, e.g., X.509 certificates. | V MUST authenticate using a signature. |
| [D]TLS 1.3 with client authentication, where V is the client and W is the server. | Run an EDHOC session on top of the TLS-protected channel. | Any type supported by EDHOC, e.g., X.509, C509, CWT, or CCS. | Any method may be used. |
| [D]TLS 1.3, where V is the client and W is the server. | Run an EDHOC session on top of the TLS-protected channel. | Any type supported by EDHOC, e.g., X.509, C509, CWT, or CCS. | Any method may be used. |
| EDHOC and OSCORE, where V is the initiator and W is the responder. | Already provided by EDHOC during the setup of the secure channel. | Any type supported by EDHOC. | Any method may be used. |
{: #creds-table title="Examples of how to secure the connection between V and W." cols="l l l"}

Expand Down

0 comments on commit 251fd98

Please sign in to comment.