diff --git a/draft-romann-iotops-mud-constrained.md b/draft-romann-iotops-mud-constrained.md index 4dc9646..2b0f770 100644 --- a/draft-romann-iotops-mud-constrained.md +++ b/draft-romann-iotops-mud-constrained.md @@ -426,22 +426,24 @@ Regarding the actual MUD URL payload transmitted using CoAP, the following consi - Signature Verification --> -## Proof-of-Possession Methods {#behavior_pop} +# Proof-of-Possession Methods {#behavior_pop} -TODO - - - -### Requirements for Proof-of-Possession - - -TODO +If the CWT does not only contain the MUD URL but also an `cnf` claim, +it is RECOMMENDED that a MUD Receiver performs a proof-of-permission mechanism +to verify the binding of the token to the respective device via its private +proof-of-possession (PoP) key. +While the CWT MUST be signed by the manufacturer the PoP key must be owned by +and specific to the device. -### Proof-of-Possession using DTLS +This section details two proof-of-posession mechanisms using DTLS and OSCORE, +both of which are (with minor differences) applicable to both the +Thing-initiated and the Receiver-iniated flow. +General considerations regarding the use of PoP methods are discussed in +{{pop-requirements}}. -TODO +## Proof-of-Possession using DTLS - - -### Proof-of-Possession using OSCORE +## Proof-of-Possession using OSCORE TODO @@ -526,6 +531,12 @@ Network operators SHOULD specify a policy that describes: --- back +# Requirements for Proof-of-Possession {#pop-requirements} + +TODO + + +