Re: [Ace] OAuth-Authz Interop

Jim Schaad <ietf@augustcellars.com> Thu, 10 May 2018 18:59 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E910112EB86 for <ace@ietfa.amsl.com>; Thu, 10 May 2018 11:59:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level:
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ykB1Np60k3mr for <ace@ietfa.amsl.com>; Thu, 10 May 2018 11:59:29 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9487012EB7E for <ace@ietf.org>; Thu, 10 May 2018 11:59:28 -0700 (PDT)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Thu, 10 May 2018 11:56:47 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: 'Mike Jones' <Michael.Jones@microsoft.com>, 'Ludwig Seitz' <ludwig.seitz@ri.se>, <ace@ietf.org>
References: <005601d3e622$af427100$0dc75300$@augustcellars.com> <e3cc1920-c9a7-aefa-a683-239099f32d21@ri.se> <7af7e847-bc7a-82ff-2024-7321575450d8@ri.se> <DM5PR00MB02969CC0E6E488B119028391F59A0@DM5PR00MB0296.namprd00.prod.outlook.com>
In-Reply-To: <DM5PR00MB02969CC0E6E488B119028391F59A0@DM5PR00MB0296.namprd00.prod.outlook.com>
Date: Thu, 10 May 2018 11:59:18 -0700
Message-ID: <00cb01d3e891$0158b8d0$040a2a70$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00CC_01D3E856.54FB8E80"
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQIYpAXHW23Avzfol4dRnuBSz27O0gHOnp3KAfwMrbkAwwZ7LqN7akRA
Content-Language: en-us
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/SU4ISpFSvc-F-Tg5SdYgD-L3jS0>
Subject: Re: [Ace] OAuth-Authz Interop
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 May 2018 18:59:32 -0000

Given that we have already started doing interop work and were successful needing to address the number assignment issues does not seem to be a blocking problem.  As long as all of the people doing the interop testing are agreed on what numbers should be there do not seem to be any issues in testing.  The only problem would be if there was a decision to ship products before the assignments were finalized.  

 

In terms of what size of items to use, this is going to be an interesting argument and one that needs to be finalized at some point.  However, it would be just as easy to remove the sentence as to change the values so there are multiple ways of solving this issue.  I don’t know that I agree that application-specific claim keys should be pushed all of the way up to 256, there is always going to be a trade off at this point in terms of what size of key to use vs how often it is believed that the key is going to be used.  If we believe that a huge percentage of usage in the IoT world for CWT items is going to be for this type of authorization and we want to keep alignment to the extent possible then it still makes sense to use the 1 or 2 byte keys for this purpose.  (Side node, it is normal to include all of the bytes encoded in the length so 256 would be a 3 byte value).  This is a trade off that needs to be discussed, but is not currently blocking.

 

Jim

 

 

From: Ace <ace-bounces@ietf.org>; On Behalf Of Mike Jones
Sent: Tuesday, May 8, 2018 10:40 AM
To: Ludwig Seitz <ludwig.seitz@ri.se>;; ace@ietf.org
Subject: Re: [Ace] OAuth-Authz Interop

 

Before any interop work is done, I suggest that it would be better to first address the significant CBOR number assignment issues I pointed out in my review on October 10, 2017 https://www.ietf.org/mail-archive/web/ace/current/msg02364.html, so that the interop is more likely to occur using number assignments that are less likely to change.  I'm repeating the most important of these comments below, since it was apparently not acted upon.

 

5.5.5 Mapping parameters to CBOR

It looks to me like these values are intended to align with those registered in the CBOR Web Token (CWT) Claims registry initially populated by https://tools.ietf.org/html/draft-ietf-ace-cbor-web-token-08#section-9.1.2.  If so, the spec should make this relationship explicit.  However, it would be inappropriate to use the rare single-byte CBOR integer values for application-specific claim keys.  I would suggest that the claim identifiers for client_id through refresh_token and profile start at 256 (a two-byte CBOR value) and go up from there.  In that case, I suspect they could be successfully registered in the CWT Claims registry – which I think you want.  (“cnf” will already be registered by draft-ietf-ace-cwt-proof-of-possession.)

 

Likewise, please search the review for all instances of the words “register” and “registry” and revised the spec accordingly before any interop work is started.

 

                                                                -- Mike

 

 

-----Original Message-----
From: Ace <ace-bounces@ietf.org <mailto:ace-bounces@ietf.org> > On Behalf Of Ludwig Seitz
Sent: Tuesday, May 8, 2018 3:54 AM
To: ace@ietf.org <mailto:ace@ietf.org> 
Subject: Re: [Ace] OAuth-Authz Interop

 

On 2018-05-08 08:57, Ludwig Seitz wrote:

> On 2018-05-07 18:44, Jim Schaad wrote:

>> I have been meaning to get this out for a while and have failed.  A 

>> doodle poll to setup an interop event for this work is at 

>>  <https://doodle.com/poll/k27g9r26bghvnytu> https://doodle.com/poll/k27g9r26bghvnytu If you want to participate 

>> and none of the times are good please let me know.

>> 

>> Things for testing:

>> 1)  DTLS profile w/ shared secret

>> 2)  DTLS profile w/ RPK

>> 3)  OSCORE profile

>> 

>> 

> 

> Note that I'm in the process of writing a test manual, I'll put it up 

> on the WG github as soon as it has some form and structure. Feel free 

> to contribute. I'm hoping to have it online by the end of the day.

> 

> /Ludwig

> 

> 

 

You can find my first draft of the interop manual here:

 

 <https://github.com/ace-wg/ace-oauth/blob/master/InteropTestPlan.txt> https://github.com/ace-wg/ace-oauth/blob/master/InteropTestPlan.txt

 

Note that large parts are still work in progress, but the test plan for the token endpoint should give you a hint as to how I was thinking it could work.

 

Feel free to propose changes and improvements.

 

 

/Ludwig

 

--

Ludwig Seitz, PhD

Security Lab, RISE SICS

Phone +46(0)70-349 92 51

 

_______________________________________________

Ace mailing list

 <mailto:Ace@ietf.org> Ace@ietf.org

 <https://www.ietf.org/mailman/listinfo/ace> https://www.ietf.org/mailman/listinfo/ace