Device Pairing Using Short Authentication Strings
draft-ietf-dnssd-pairing-05
Document | Type | Expired Internet-Draft (dnssd WG) | |
---|---|---|---|
Authors | Christian Huitema , Daniel Kaiser | ||
Last updated | 2019-04-18 (latest revision 2018-10-15) | ||
Replaces | draft-kaiser-dnssd-pairing | ||
Stream | IETF | ||
Intended RFC status | Proposed Standard | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Reviews | |||
Stream | WG state | WG Document | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Expired | |
Consensus Boilerplate | Yes | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-ietf-dnssd-pairing-05.txt
Abstract
This document proposes a device pairing mechanism that establishes a relation between two devices by agreeing on a secret and manually verifying the secret's authenticity using an SAS (short authentication string). Pairing has to be performed only once per pair of devices, as for a re-discovery at any later point in time, the exchanged secret can be used for mutual authentication. The proposed pairing method is suited for each application area where human operated devices need to establish a relation that allows configurationless and privacy preserving re-discovery at any later point in time. Since privacy preserving applications are the main suitors, we especially care about privacy.
Authors
Christian Huitema
(huitema@huitema.net)
Daniel Kaiser
(daniel@kais3r.de)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)