Device Pairing Using Short Authentication Strings
draft-ietf-dnssd-pairing-05
Document | Type |
Expired Internet-Draft
(dnssd WG)
Expired & archived
|
|
---|---|---|---|
Authors | Christian Huitema , Daniel Kaiser | ||
Last updated | 2024-02-28 (Latest revision 2018-10-15) | ||
Replaces | draft-kaiser-dnssd-pairing | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Proposed Standard | ||
Formats | |||
Reviews |
SECDIR Early review
(of
-00)
by Stephen Kent
Has issues
|
||
Additional resources | Mailing list discussion | ||
Stream | WG state | Dead WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired | |
Consensus boilerplate | Yes | ||
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document proposes a device pairing mechanism that establishes a relation between two devices by agreeing on a secret and manually verifying the secret's authenticity using an SAS (short authentication string). Pairing has to be performed only once per pair of devices, as for a re-discovery at any later point in time, the exchanged secret can be used for mutual authentication. The proposed pairing method is suited for each application area where human operated devices need to establish a relation that allows configurationless and privacy preserving re-discovery at any later point in time. Since privacy preserving applications are the main suitors, we especially care about privacy.
Authors
Christian Huitema
Daniel Kaiser
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)