Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider S0 inclusion in S2 capable network insecure #6860

Open
AlCalzone opened this issue May 17, 2024 · 1 comment
Open

Consider S0 inclusion in S2 capable network insecure #6860

AlCalzone opened this issue May 17, 2024 · 1 comment
Labels
bug Something isn't working Spec compliance 👮🏻‍♂️ Needs to be done to comply with the specifications

Comments

@AlCalzone
Copy link
Member

If a node has been security bootstrapped with the S0 Command Class in an S2 capable network, the SIS / Primary controller MUST issue a warning message to the user informing that the node has not been included securely.

@AlCalzone AlCalzone added bug Something isn't working Spec compliance 👮🏻‍♂️ Needs to be done to comply with the specifications labels May 17, 2024
@AlCalzone
Copy link
Member Author

AlCalzone commented May 17, 2024

Note that this is already done for the case when S0 is chosen automatically, e.g. for a (seemingly) legacy lock. If S0 is chosen by the user, this requirement does not really make sense. So we'll have to figure out how to align with the specification here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working Spec compliance 👮🏻‍♂️ Needs to be done to comply with the specifications
Projects
None yet
Development

No branches or pull requests

1 participant