Skip to content

Commit 5542ecd

Browse files
committed
doc: Extend and take responsibility for 802.15.4 security roadmap
1 parent 7b01d41 commit 5542ecd

File tree

1 file changed

+15
-1
lines changed

1 file changed

+15
-1
lines changed

doc/doxygen/src/roadmap.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,4 +97,18 @@ The text and items below are tentative, up for discussion, to be updated by regu
9797
1. RNG unified (secure, or basic), seeding
9898
2. easy TinyDTLS integration in sock, with CoAP etc.
9999
4. RIOT default configuration = secure configuration (that's our goal/motto)
100-
5. 802.15.4 link layer security (gaps in RFCs? How to update keys?)
100+
101+
102+
## 802.15.4 link layer security
103+
(contact/steering: [chrysn](https://github.com/chrysn))
104+
105+
Current status: RIOT supports application provided keys,
106+
with no guidance on how to (and no practical ways to) use that securely
107+
(see [CVE-2021-41061](https://nvd.nist.gov/vuln/detail/CVE-2021-41061)).
108+
109+
Goal: Usably secure defaults.
110+
111+
1. Figure out applicability of [RFC9031](https://www.rfc-editor.org/rfc/rfc9031) ("CoJP") to non-6TiSCH scenarios.
112+
2. Implement RFC9031 with any extensions needed for the MACs RIOT has.
113+
3. Provide tools to set up a recommended JRC, and to provision keys between it and the device at flash time.
114+
This may entail extensions to the build process, as CoJP requires per-device secrets.

0 commit comments

Comments
 (0)