[Ace] Review of draft-ietf-ace-pubsub-profile-03

Marco Tiloca <marco.tiloca@ri.se> Mon, 30 August 2021 18:14 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0F6363A1CA4; Mon, 30 Aug 2021 11:14:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aj4Ddj8QCX1f; Mon, 30 Aug 2021 11:14:45 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40048.outbound.protection.outlook.com [40.107.4.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AA49A3A1C9F; Mon, 30 Aug 2021 11:14:41 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=clnD9Kq2h9IYimhlrijo8tVX3LYUrzSutk/dHbB/hJVjImVkc4WHF+J1qtNItl6VbdfOswiYovkmmyUrNbef/I5L2l5we2jKJTNg9mePN3puQsj+ioOogkZrjtLBXjfKS4YkCqDMDtKoHA+Yb56l0HObbfFSYh4x7wl88p+xxGFVKmsTNmDYoh/JEqBLDxhR111ymZxGPGVWkznXPaZhtgz1FGZIVg9irdfeXk7y7ZsZ04liK3uEvByqU1lTkTQEXIdP4qpJYtvNsGesrlgx74vdnNllmELYqjuqw6u+H15HICBFZt3P8bOwFfSOoxStHzWNkIZrbhLN70ItJD9Y8Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DQ657+xmpv+9dasni/BfXO+3USZAC2Q9IKvRyMDOk6M=; b=gPQt24ZwNr0wOIpxCJ6y159R2ejIL8uvId+dTtX0ndrjzhb6efH1hLb8ILdbeEuLglrpldr3ziaeuBMIjJfU9/ALHH++h568MosniArABTzT26qRrqtfM59wfdCQoFaOqK9+rnnzgR5Z9O8coEIusCLDOyRg9LWWZ8xdAmAIw15rK1Ba/9L1ESSpe8BTdwTQZP+1Gn3DZF1MUyrFKIVzGtSqOXTDzNe1uPI2DU1EB69tiAoJju9XENmDV5IznQUyioIrnYMBkmRIfMqOqTdg5+uL+GhgjHyQZgI1iEo9G8VXWXcB4DqEswJ1/Modg0S9NwCXXSVqkPaoK4PGWSwtXw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=DQ657+xmpv+9dasni/BfXO+3USZAC2Q9IKvRyMDOk6M=; b=HOV/RGpqUp5HNNYGxa9g68jwKjllXIspyDknj8+C4fgkVWBYYqKSZHzuT3t34L63brUtiRrXMghz0A+XZNWsY1H7ZwAYjhRAjF6U0d5OkVtCX8I6nmbMa5F3VJOm6O3v4d6WXHQsi6LXmXSZ90EK6QiDMKPWkEsXTO8P0COq5uE=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by DB8P189MB0620.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:128::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.20; Mon, 30 Aug 2021 18:14:38 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::a9af:c9af:e0cc:4e53]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::a9af:c9af:e0cc:4e53%3]) with mapi id 15.20.4457.024; Mon, 30 Aug 2021 18:14:38 +0000
To: draft-ietf-ace-pubsub-profile@ietf.org
Cc: ace@ietf.org
From: Marco Tiloca <marco.tiloca@ri.se>
Message-ID: <7312f414-23c6-fefa-7528-ab4ffb3575e6@ri.se>
Date: Mon, 30 Aug 2021 20:14:35 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="cF77ydkLPx7IuavdLNO2exyANM214tzE6"
X-ClientProxiedBy: HE1P191CA0001.EURP191.PROD.OUTLOOK.COM (2603:10a6:3:cf::11) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [10.8.1.4] (185.219.140.117) by HE1P191CA0001.EURP191.PROD.OUTLOOK.COM (2603:10a6:3:cf::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4457.20 via Frontend Transport; Mon, 30 Aug 2021 18:14:37 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 39f0435e-9de9-4c3f-4910-08d96be20724
X-MS-TrafficTypeDiagnostic: DB8P189MB0620:
X-Microsoft-Antispam-PRVS: <DB8P189MB0620FD79DD2D90B050E5792199CB9@DB8P189MB0620.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:6108;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(396003)(136003)(366004)(346002)(39860400002)(376002)(8676002)(6486002)(38100700002)(6916009)(2906002)(21480400003)(66476007)(235185007)(956004)(66556008)(36756003)(86362001)(5660300002)(16576012)(44832011)(316002)(31696002)(2616005)(66946007)(8936002)(33964004)(4326008)(19627235002)(26005)(31686004)(450100002)(478600001)(66574015)(83380400001)(30864003)(966005)(186003)(43740500002)(45980500001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 39f0435e-9de9-4c3f-4910-08d96be20724
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 30 Aug 2021 18:14:37.8724 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: uWJZvq3B8kYvoqi//H6dVyG8rZZSCIOHeCz5DdvKM/WuQXJ+BGik+j87mpE/vSZWyvTB4PzbNjrBVqne9rJTew==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8P189MB0620
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/Ge3UJxSoQjoo6IAenGBBBjtkUqo>
Subject: [Ace] Review of draft-ietf-ace-pubsub-profile-03
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Aug 2021 18:14:52 -0000

Hi all,

Please, see below my review of version -03.

Overall, I think this is on the right track and I do appreciate having 
converged to a single AS :-)

I hope the comments can help improving and progressing the document!

Best,
/Marco




This review uses "KG" to refer to draft-ietf-ace-key-groupcomm-13 [KG], 
and "KGO" to refer to draft-ietf-ace-key-groupcomm-oscore-11 [KGO].

[KG] https://datatracker.ietf.org/doc/html/draft-ietf-ace-key-groupcomm-13

[KGO] 
https://datatracker.ietf.org/doc/html/draft-ietf-ace-key-groupcomm-oscore-11


[General]

* Please, replace references to RFC 8152 with references to 
draft-ietf-cose-rfc8152bis-algs and I-draft-ietf-cose-rfc8152bis-struct.


* This draft is basically using only the ace-group/GROUPNAME resource at 
the KDC defined in KG, and only its POST handler for joining a group. 
Will this draft describe/mention also how the rest of the KDC interface 
is used by the pub-sub clients?


[Abstract]

* "This profile relies on transport layer or application layer security 
to authorize the pub-sub clients to the broker".

    This is aligned with the currently existing transport profiles of 
ACE (based on DTLS and OSCORE). However, do you actually want to limit 
that security enforcement to those two layers?

    More in general, I think this application profile can build on any 
transport profile of ACE that the broker and the KDC are fine to use 
with the pub-sub clients. This seems in fact the intention later in 
Section 2 and Section 4.2, where some transport profiles are mentioned 
as a non final set to choose from.


* Proposed expansion of the last sentence:

    "... it describes the use of application layer security to protect 
the content that pub-sub clients exchange by communicating through the 
broker."


* While it is mentioned later in Section 1, I think that the abstract 
should already mention that this profile covers both CoAP and MQTT.


[Section 1]

* "This document defines a way to authorize pub-sub clients using the 
ACE framework ...".

     Please, clarify what they are authorized to do. Conceptually, it 
should be about joining a security group that uses certain key material 
and is associated to one or more topics (application groups). 
Practically, this should mean being authorized to getting access to the 
broker and to obtaining the key material for protecting the topic 
content exchanged through the broker.


* "... for protecting the communication between them".

    I would emphasize that it is about protecting the content, exhanged 
by communicating through the broker (see also the related comment above 
for the Abstract).


* After "(CoAP)", please add a reference to RFC 7252.


[Section 2]

* "Note that both publishers and subscribers use the same profiles."

    I suggest to expand as follows: "Note that both publishers and 
subscribers use the same pub-sub communication protocol and the same 
transport profile of ACE in their interaction with the broker. The same 
profile of ACE is also used in the interaction with the KDC."


* Caption of Figure 1: s/Authorization Servers/Authorization Server


* "... so that RS can authorize the Clients ..."

    Well, the AS is the one authorizing the Clients. I think you mean 
"... so that RS can assert the Clients to be authorized ..."


* I suggest to move the following points out of the last paragraph, and 
instead have them after "... to as Client in short."

    - The broker acts as ACE RS.
    - The broker corresponds to the Dispatcher in KG.


* The last sentences can be expanded for clarity, e.g.: "... the Broker 
MAY accept subscriptions from unauthorised Subscribers. In this case, a 
Subscriber client can skip setting up Security Association 1 with the 
Broker, before subscribing to topics of interest at the Broker."


[Section 3.2]

* Consistently with the first paragraph, the section title can be 
"Authorising to the KDC and the Broker".


* About 'scope', s/the topic identifier/the topic identifiers


* About 'audience', it cannot be an array, but only a single text 
string, see [1]. If you want to keep a single Token intended to both KDC 
and broker, then you neeed to rely on a single audience value that both 
the KDC and the broker recognize as valid. A possible way can rely on 
the KDC identifier and the broker identifier separated by a well-known 
and unambiguous separator.

[1] 
https://datatracker.ietf.org/doc/html/draft-ietf-ace-oauth-authz-45#section-5.8.5


* More generally about using a single Token intended to both KDC and 
broker, that requires additional security when protecting the Token, as 
per [2].

    First, you would need the AS to also protect the Token with an 
asymmetric signature, that both the KDC and the broker have to verify 
using the AS' public key. See the second paragraph of [2].

    Second, since the same Token is targeting multiple Resource Servers 
as part of a broader audience, you cannot have a same single secret used 
as symmetric PoP key, see the third paragraph of [2]. This seems to 
limit the use of the DTLS profile to its aymmetric mode only, and to 
rule out the use of the OSCORE profile.

    I don't see an obvious way out, other than reverting to two separate 
Tokens, i.e. one to post to the KDC and one to post to the broker.

    [2] 
https://datatracker.ietf.org/doc/html/draft-ietf-ace-oauth-authz-45#section-6.1



* If a single Token is used for both the KDC and the broker, one 
additional clarification is probably required.

    Since the 'scope' claim in Token indicates names of application 
groups, posting the the Token to the broker indicates which topics the 
client is authorized to publish/subscribe to.

    However, what does it mean when posted to the KDC? I suppose it 
authorizes the pub-sub client to obtain from the KDC the key material 
for any security group associated to any of the application groups 
mentioned in the Token.

    Note that the 'scope' parameter of the Joining Request to the KDC 
specifies the name of the security group for which the key material is 
requested. So, the KDC will need a kind of internal mapping from names 
of application groups (in the Token) to names of security groups (in the 
'scope' of the Joining Request). Even in the simple (and most common) 
case where only one security group is associated to an application 
group, the two names might differ and it's up to the client to know both 
of them in advance --- through pre-configuration, discovery, etc.


* s/'profile' is set/the 'ace_profile' claim is set  (two occurrences)


[Section 4.1]

* By using 'sign_info' during the Token post, the client cannot ask for 
the public keys already, but only for the format of public keys used in 
the group.


* "The KDC verifies that the Client is authorized to access the topic 
with the requested role."

    Well, the KDC is in a trust relation with the AS issuing the posted 
Token (and only following a successful check of a Token request against 
stored access policies). So, at this stage on the KDC, isn't this just 
about verifying that the Token is valid?


[Section 4.2]

* Considering its content and the examples, the section can be renamed 
as "Join Request and Join Response".


* The content-format of the Joining Request is 
"application/ace-groupcomm+cbor". That's the "namespace" where these new 
ACE Groupcomm parameters have been registered, see Section 7 of KG.


* As to 'scope', here it is not "as defined earlier". In comparison with 
the format defined earlier, it specifies only one scope entry, i.e. the 
one indicating the exact topic for which the client wants to obtain the 
key material with this Joining Request. This is also defined in Section 
4.1.2.1 of KG.


* "... Client's public key formatted as a COSE_Key"

    In KG, there has been a change about the format of public keys used 
in a group.

    Pure COSE Keys are not admitted anymore, due to their limitations to 
represent identities or other metadata. This is aligned with 
corresponding changes done for the same reasons in draft-ietf-lake-edhoc 
and draft-ietf-core-oscore-groupcomm .

    The format of public keys used in the group and indicated in the 
parameter 'pub_key_enc' now takes value from the "COSE Header 
Parameters" registry, for which some entries are under pending registration.

    The easiest way to "somehow still use COSE Keys" is to use the 
public key format Unprotected CWT Claim Set (UCCS) [3], including a COSE 
Key as value of its 'cnf' claim. Please, see an example below. You can 
find some more detail on this point in Sections 6.1 and 6.4 of KGO.

{                                              /UCCS/
   2 : "42-50-31-FF-EF-37-32-39",               /sub/
   8 : {                                        /cnf/
     1 : {                                      /COSE_Key/
       1 : 1,                                   /alg/
       3: -8,                                   /kty/
      -1 : 6,                                   /crv/
      -2 : h'C6EC665E817BD064340E7C24BB93A11E   /x/
             8EC0735CE48790F9C458F7FA340B8CA3'
     }
   }
}

    [3] https://datatracker.ietf.org/doc/draft-ietf-rats-uccs/


* On expectable actions around "TODO: Check 'cnonce'", you may also want 
to look at Sections 6.2.1 and 6.3 of KGO.


* "The Subscriber MUST have access to the public keys of all the 
Publishers; this MAY be achieved ... using "pub" as the 'role_filter' ..."

    Why do you need the filtering feature here? It would still work, but 
based on the previous sentence in the same paragraph, the KDC has 
available to provide only public keys of publishers anyway. So, asking 
for all the public keys in the group with 'get_pub_keys' encoding the 
CBOR simple value Null will return only the public keys of publishers by 
construction.


* "Note that the alg parameter in the 'client_cred' COSE_Key ..."

    See the comment above about the format of public keys not using pure 
COSE Keys anymore.


* s/The KDC response to Joining Response/The KDC replies with a Joining 
Response


* The fields of the joining response are defined in Section 4.1.2.1 of 
KG (not in its Section 4.2).


* The content-format of the Joining Response is 
"application/ace-groupcomm+cbor".


* When describing 'key', "defined by the AS2" is mentioned for both 
'alg' and 'Base IV'. I guess this is a remnant from previous versions of 
the draft having both AS1 and AS2.


* Before defining the format of the Joining Response, it's good to 
introduce the symmetric key as generated by the KDC, later provided to 
all the clients joining the group, and what it is used for.


* "... public keys of all authorized signing members ...", which means 
just the publishers, right?


* "... formatted as COSE_Keys ..."

     See the comment above about the format of public keys not using 
pure COSE Keys anymore.


* "... For Subscriber Clients, the Joining Response MUST contain the 
'pub_keys' parameter."

     Why? Even if the client did not ask for them in the Joining 
Request? The sub-resource at ace-group/GROUPNAME/pub-key allows for a 
later retrieval, possibly spreading the provisioning of public keys in 
different exchanges through filtering.

     If you really want what you're saying here, it might be just easier 
to say upfront for the Joining Request that Subscriber Clients MUST 
include 'get_pub_keys' --- While that uses a MAY at the moment.


* Figure 6 and Figure 9 will need to be revised based on the comment 
above about the format of public keys not using pure COSE Keys anymore.


* The public key of Figure 6 (in 'client_cred') and of Figure 9 (in 
'pub_keys') includes also the 'kid' header parameter. This is not 
mentioned earlier in the text describing the Joining Request and Joining 
Response.

    In particular for 'client_cred' in the Joining Request, this gives 
the impression that it is up to the client to self-assign a 'kid' value 
to its own public key. This can later result in collisions, i.e. two 
publishers may have a public key with the same 'kid' value. Later on, 
this in turn puts a subscriber at least in a situation where it might 
have to try verifying a message signature using different public keys, 
until the right one is used.

    I think it's better that the KDC exclusively determines these 
identifiers, as uniquely associated not only to the public key for its 
retrieval but also to the corresponding publisher client. As to the 
actual provisioning of these identifiers, there are two ways:

    a) The one currently used in the Joining Response, where that 
identifier is the value of the 'kid' header parameter; or, as I believe 
a better option,

    b) The separate 'peer_identifiers' parameter defined in Section 
4.1.2.1 of KG.

    In either case, I think it's fine later on in Section 5.1 to have a 
published message specifying in the 'kid' COSE parameter the identifier 
to use for retrieving the right public key.


* Based on a comment above on which public keys the KDC actually stores, 
Figure 8 may have 'get_pub_keys' simply encoding the CBOR simple value Null.


[Section 5]

* s/is protected with COSE/is protected with COSE by the publisher (two 
occurrences)


* Figure 11 and the following paragraph should show/mention that, when 
using CoAP, Observe (RFC 7641) is used together with GET in order to 
effectively subscribe. See also [4].

[4] 
https://datatracker.ietf.org/doc/html/draft-ietf-core-coap-pubsub-09#section-4.4


* I think it can be better to swap this current Section 5 with the 
current Section 6. Even though separately for the CoAP and MQTT case, 
Section 6 covers the Token posting at the broker, which happens before 
the actual pub-sub communication described in Section 5.


[Section 5.1]

* s/COSE_Encrypt0/COSE_Encrypt0 object


* I suppose the empty string for the 'external_aad' applies to both the 
encryption and the signing process. Correct?


* In order to encrypt the message, how do you build the AEAD nonce?

    All the group members have the same Base IV received in the Joining 
Response, and clearly they are not expected to synchronize with one 
another about their individual message counter used as Partial IV. 
Hence, the basic Message IV construction constisting in xoring the Base 
IV with the zero-padded Partial IV yields the risk of reusing the same 
(nonce, key) pair.

    If the KDC exclusively assigns the identifiers for public keys and 
group members (see comment above), it should work to build the AEAD 
nonce in a similar way like OSCORE does, see [5].

    That would also mean having a quite smaller Partial IV in the 
unprotected header of the COSE_Encrypt0 object, while now in Figure 12 
it consistently has a size of 7 bytes as expected for the AEAD nonce by 
AES-CCM-64-64-128.

    [5] https://datatracker.ietf.org/doc/html/rfc8613#section-5.2


* Please, add a reference to draft-ietf-cose-countersign , and specify 
that you are using the structure COSE_Countesignature.

    As a related point, the value 7 used for 'countersign' in Figure 12 
is going to be deprecated [6], so it'll need to be updated later on.

    [6] 
https://datatracker.ietf.org/doc/html/draft-ietf-cose-countersign-05#section-5.2


* "The protected Headers ... MAY contain the kid parameter, ..."

    It is optional for the KDC to provide one in the Joining Response, 
but I guess that if one is provided, then it MUST be included in the 
protected header.


[Section 6.1]

* "For implementation simplicity, it is RECOMMENDED that the ACE 
transport profile used and this specification use the same format of 
"scope".

    Is this actually meaningful and enforceable?

    The format of scope is related to the application that the Client 
and the RS want to run. In fact, these _application_ profiles for group 
communication are defining formats to use for scope, in Tokens used to 
access resources related to such applications.

    In other words, I think the format of scope is orthogonal to the 
used transport profile, that basically does not care (and should not). I 
also can't find anything suggesting otherwise in the ACE framework [7] 
or in the DTLS and OSCORE profiles.

    Unless I'm missing something, it's probably just fine to remove the 
sentence.

    [7] 
https://datatracker.ietf.org/doc/html/draft-ietf-ace-oauth-authz-45#appendix-C


[Section 6.2]

* "An application group has relevance at the application level - for 
example, in MQTT an application group could denote all topics stored 
under ""home/lights/"."

    For what is worth, I thought of one exact topic to be one 
application group. So, in the example above, "home/lights/" can be seen 
a reasoned collection of related application groups, but not as an 
application group itself.


* "... the client needs to discover the (application group, security 
group) association. In MQTT, $SYS/ ... can be used by the broker for 
this purpose."

    The security group here is related to the key material used to 
protect the content with COSE, which is competence of the KDC. That key 
material is intended for the security group members, which do not 
include the broker.

    Hence, unless the KDC and the broker are components of a same system 
under the same authority, I would have expected the broker to have no 
idea of how the application groups it manages are related to the 
security groups that the KDC manages.

    I would rather expect the KDC to be aware of such associations, e.g. 
by learning about them when the security groups are actually created on 
it. The KDC can later on advertise these associations. For the Group 
OSCORE case targeted in KGO, this can happen through a Resource 
Directory, as discussed in [8] and using the approach defined in [9].

    [8] https://datatracker.ietf.org/doc/draft-ietf-ace-oscore-gm-admin/

    [9] https://datatracker.ietf.org/doc/draft-tiloca-core-oscore-discovery/


* "Client computes the corresponding security groups ..."

    Do you mean "Client considers ..." ?


* "RS validates the PUBLISH message by checking the topic's security 
group association and the stored token."

    Even having the broker aware of the association (application group, 
security group) as defined in the draft, how does this validation work?

    - The protected message targets a resource at the broker associated 
to the application group.
    - By assumption, the broker knows the security group(s) associated 
to the application group.
    - From the broker's point of view, the Token specifies the 
application group.

    I understand checking whether the request to the broker targets a 
topic resource (an application group) where the client is authorized to 
publish as per the Token. But how does the mentioned validation involve 
checking that the request is also related to the security group?

    Also, is that actually important for the broker, which by the way 
does not have the key material of the security group?


[Section 7]

* "... by the same entity having control of the topic, i.e. KDC."

    Perhaps here you mean "... by the same entity having control of the 
key material for that topic, i.e. KDC."


* The second paragraph seems to mix together authorization to publish 
and source-authentication of messages.

    If it is not critical that only authorized publishers can publish, 
then the broker might not necessarily enforce access control on 
publishers. That is, a publication request would be accepted and 
processed even if there was no posted Token supporting this operation.

    Instead, not using an additional signature and relying only on 
integrity-protected encryption based on group key material, is about: i) 
accepting that subscribers cannot be able to precisely identify the 
actual publisher that has sent a message to the group; and ii) accepting 
that any group member (subscribers included) can modify content 
published by the actual publisher, in case communications between the 
broker and the subscribers are not protected.


* "Subscribers can be excluded from future publications through 
re-keying for a certain topic. ... How this could be done is out of 
scope for this work."

     Doesn't the same hold for publishers too?

     Is there any plan about defining a rekeying approach in this 
document? I think that a basic point-to-point approach can be pretty 
much like the one defined in Section 20 of KGO, although filling the 
'key' parameter as defined in this document. It might actually be even 
simpler as to the provided content, since you may not need to provide 
additional information to support a recovery for group members that have 
missed a rekeying instance, like KGO has to do.


[Section 8.2]

* Shouldn't the field "Profile" indicate both coap_pubsub_app and 
mqtt_pubsub_app ?


[Appendix A]

* The list of requirements has been greatly revised and extended in 
Appendix A of KG, with new mandatory and optional requirements. So this 
list will need to be re-aligned with the list in KG, and parts of this 
document will need to be revised/extended to say how the updated set of 
requirements is fulfilled.



== Nits ==

[Section 3.2]

s/data model is described/data model described


[Section 4.2]

s/singature/signature


[Section 6.2]
s/To be able join/To be able to join


[Appendix A]

s/Specity/Specify

s/tranport/transport

-- 
Marco Tiloca
Ph.D., Senior Researcher

Division: Digital System
Department: Computer Science
Unit: Cybersecurity

RISE Research Institutes of Sweden
https://www.ri.se

Phone: +46 (0)70 60 46 501
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)