Re: [Ace] Review Comments on -03

Olaf Bergmann <bergmann@tzi.org> Thu, 06 September 2018 08:24 UTC

Return-Path: <bergmann@tzi.org>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 669D8130DFA; Thu, 6 Sep 2018 01:24:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level:
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F0hpoL4kF3M6; Thu, 6 Sep 2018 01:24:11 -0700 (PDT)
Received: from smtp.uni-bremen.de (gabriel-vm-2.zfn.uni-bremen.de [134.102.50.17]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D932128CB7; Thu, 6 Sep 2018 01:24:08 -0700 (PDT)
Received: from wangari.tzi.org (dynamic-218-i.informatik.uni-bremen.de [134.102.218.208]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.uni-bremen.de (Postfix) with ESMTPSA id 114DF26747; Thu, 6 Sep 2018 10:24:06 +0200 (CEST)
From: Olaf Bergmann <bergmann@tzi.org>
To: Jim Schaad <ietf@augustcellars.com>
Cc: draft-ietf-ace-dtls-authorize@ietf.org, 'ace' <ace@ietf.org>
References: <00dc01d41c9e$af8ad9b0$0ea08d10$@augustcellars.com>
Date: Thu, 06 Sep 2018 10:24:06 +0200
Message-ID: <87tvn311ax.fsf@tzi.org>
User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/6KkN5Q-RHNArKg6DrAznZc1iyTE>
Subject: Re: [Ace] Review Comments on -03
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 06 Sep 2018 08:24:14 -0000

Hi Jim,

Thanks again for your review. I have addressed a bunch in -04 and opened
a couple of issues in the tracker at
https://github.com/ace-wg/ace-dtls-profile/issues for those that I still
need to look into.

Please find a few additional answers inline:

Jim Schaad <ietf@augustcellars.com> writes:

> Meta Question - Is there a check list that I can run through which says that
> these are the things that a profile needs to cover.  Part of this question
> about how the document is structured.  I was of the opinion that a profile
> was going to need to cover one or both of the following issues:  How does
> this profile deal with communications between the C and the RS?  How does
> this profile deal with communications between the C and the AS?  How does
> this profile deal with communications between the RS and the AS?

I was under the impression that Appendix C of draft-ietf-ace-oauth-authz
is supposed to serve this purpose.

> *  If the document discusses how to do communications between the client and
> the AS, I do not believe that you can rule how mutual authentication between
> those two entities as being out of scope.  You don't need to specific how
> the initial configuration is done, but the fact that you are using DTLS with
> pre-configured credentials needs to be in scope.

I am currently not sure what to say in the document. I will come back to
this later.

> * It is too bad that we don't have the generic coap schemas defined yet so
> that we can use that as part of the URL returned with an access denied
> response.
>
> * Point to Authz document for the details of getting the AS URL back in
> section 2 p 3

Done.

> * Update section 2 to talk about the use of the rs_cnf parameter.  For RPK
> no cnf parameter would be expected to be returned.

Done.

> *  Deal with RPK and PSK in separate paragraphs.  Yes you may have some
> duplication of text but the details are sufficiently different that it would
> read better.  Section 2

Done.

> * Section 2.1 - PSK is not a session key.  The session key is inside of TLS.
> This means that the session  key is not the identity.

Depending on the level of abstraction. But yes, to avoid confusion, this
has been changed now to "shared secret".

> * Section 2.2 - Is there an intent in this paragraph that if the kid does
> not match the current DTLS session that the CWT would be rejected?  That
> appears to me to be what the text says but I am not sure.  Next paragraph
> appears to say any active DTLS session rather than just the current one.

There is no "current DTLS session". The server may have multiple DTLS
sessions, one of which may have been established using a key that
happens to be associated with the given kid. Any DTLS session where this
is the case (usually, this would not be more than one DTLS session)
needs to be updated as described.

> * Section 2.3 p 3 - How is a check done for the PSK being the same if one
> has deleted all of the CWTs and then get an update over the secure channel.
> Just having the kid be the same should not be sufficient.

I am not sure that I understand this question correctly. But there
should be no secure channel associated with a deleted CWT.

> * Section 2.3 - Is the kid parameter still needing to be defined given the
> CWT POP key id option?  (Assuming that it does not disappear.)

You are probably right. But then, we would have to include a cnf claim
containing the kid accourding to
draft-ietf-ace-cwt-proof-of-possession. Otherwise, there would be a
conflict with the numbers proposed for oauth-authz (specifically, the
aud parameter from CWT as listed by Ludwig in
https://mailarchive.ietf.org/arch/msg/ace/cX-DjWxSC4PehY0bEmbaNeeT2pI)

> * Section 3 - YEAH you are doing POP on the RPK as part of the request.  I
> like this!!!!!!!

Thanks :-)

> *  Section 3 - The last 2 sentences in this section are giving me problems.
> I don't understand when  and where you are putting kids and why.

Ok, I will revisit this.

> * Section 4 - if the token is already secure then no secure channel would be
> needed.  Hard to have a secure channel if you have not setup anything yet.

Ok, I will revisit this.

> * Section  4 - Are we really using MAX-AGE and not expires in for duration.

Changed. (Removed as it does not contain new information.)

> * Section 4 - Update the pointer to a PoP token description

Okay, will do.

> * Section 4.1 - I think that this is not what the COSE_Encrypt structure is
> defined in the POP structure for.  Revisit this.

Okay, will do.

> * Section 4.2 - Remove everything to do with renegotiation of TLS - It is no
> longer present in 1.3

Done.

> s/Is also adds/It also adds/

Done. (I hope — did not find it anymore).

Grüße
Olaf