-
Notifications
You must be signed in to change notification settings - Fork 52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify consequences of new DTLS Session #177
Comments
IMHO, this sentence should be removed from the spec. |
@boaks: which other messages ? If a client is not registered, the LWM2M messages it sends are ignored. @sbernard31 : I agree the LWM2M registration should be independant of the DTLS session. However, the CoAP specification expects all operations (especially observation) to be contained in the same DTLS session. |
@dnav even more, the spec say same connection and same epoch. (which means no session resumption, no renegotiation) |
@dnav: which other messages ? If a client is not registered, the LWM2M messages it sends are ignored. Yes, your right, if a client is not registered, it is not that difficult. And unfortunately the reality (at least in my experience) offers some more surprise.
So, with your premise “client is not registered”, a new DTLS session must “deregister” the client (I hope, the used DTLS libraries will offer such callbacks). But that should then be specified in the TS (at least in my opinion). And if too many find out, that their DTLS library doesn't support that callback, then the "check" for "update" should be defined also. |
When you guys write that the "lifetime of the LWM2M registration should be independent of the DTLS session" what aspects are you specifically concerned about? It might also be useful to clarify what you mean by DTLS session lifetime? |
My concerns explained here: About DTLS session lifetime : https://tools.ietf.org/html/rfc5246#appendix-F.1.4 |
In LwM2M v1.1 we will have to re-evaluate the relationship between the transport and the communication security mechanism. In general, I agree that the lifetime of the LwM2M registration should be independent of the lifetime of various TLS/DTLS security credentials. As pointed out in the discussion I believe there is an item that needs to be brought to the attention to the CORE working group as well (since the CoAP specification seems to be incorrect). |
OMA-TS-LightweightM2M-V1_0-20161123-D, 8.2.4
Please describe the behaviour, when a DTLS session is established and the client doesn't send a registration. Should othe messages be ignored? Denied?
The text was updated successfully, but these errors were encountered: