**Session Date/Time:** 18 Mar 2025 10:00 # lake ## Summary The LAKE working group meeting covered updates on several draft documents including lightweight authorization (ad-hoc), application profiles, implementation considerations, remote attestation, and pre-shared key authentication. Discussions also included quantum resistance for ad-hoc and the bundle protocol. The group discussed future steps and open issues for each document. ## Key Discussion Points * **Lightweight Authorization (ad-hoc):** Reverse flow implementation was discussed, addressing issue 21. The changes involve the device (U) acting as the responder. Editorial updates include clarifying cipher suite selection, addressing typos, and acknowledging funding. * **Application Profiles:** Focus on numeric identifiers for prearranged profiles. Draft was adopted and revisions made based on Michael Richardson's comments. Advertising support parameters in ad-hoc messages was discussed. The working group also discussed canonical representation of application profiles and whether a JSON equivalent is needed. * **Implementation Considerations:** Updates to the reference considering RFC publication. Consistency checks of authentication credentials specified in multiple ways during a single ad-hoc session were discussed. * **Remote Attestation (RA):** Draft has been adopted, focusing on updates based on Michael and June's comments. A simplified version for attestation using pre-existing relationships was added. The addition of an appendix for continuous attestation was proposed. * **Pre-shared Key (PSK) Authentication:** Corrections made after adoption. Discussion around message 3 structure and transcript hash computation. Adding identity to the subfield of the Great PSK. Formal analysis is requested for the document once it reaches sufficient stability. * **Quantum Resistance:** Discussion on how to add quantum resistance to ad-hoc. Standard PQC algorithms are drop-in replacements for key exchange and signatures in ad-hoc method one. The viability of PSK was considered. Hybrid approaches were also briefly touched upon. * **Bundle Protocol:** A potential use case for embedding ad-hoc in a larger security negotiation protocol for delay-tolerant networks was presented. The presentation focused on using EAD items to transport upper-level information in a environment with high and variable delay. ## Decisions and Action Items * **Action Item (Chairs):** Update the milestones on Datatracker with appropriate dates. * **Action Item (Chairs):** Schedule an interim meeting before IETF 123 in Madrid. * **Action Item (Giovanni):** Revise the Lightweight Authorization draft, specifically addressing the comment of Tom Wechers. * **Action Item (Elsa):** Respond to Tom Wechers' comments on the security claims of the pre-shared key draft in the next revision. * **Action Item (Brian):** Submit an Internet Draft for the bundle protocol ad-hoc use case. ## Next Steps * **Lightweight Authorization (ad-hoc):** Detailed review and implementation testing. * **Application Profiles:** Adding more examples and well-known profiles. * **Implementation Considerations:** Elaborate on the enforcement of null and in policy * **Remote Attestation:** Clarify and correct the section arrow handling, add the section for the water fires. * **Pre-shared Key (PSK) Authentication:** Add test vectors and eventually call for a formal analysis once the protocol is stable. * **Quantum Resistance:** Continue discussing and waiting on the algorithms to be standardized in COSI. * **Bundle Protocol:** Get an actual internet draft out for this use so that people can can focus on more of the technical detail and ask the working group to assign some review for it.