[Ace] draft-ietf-ace-dtls-authorize-01
Hannes Tschofenig <hannes.tschofenig@gmx.net> Sun, 01 October 2017 09:35 UTC
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F273B13471B for <ace@ietfa.amsl.com>; Sun, 1 Oct 2017 02:35:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cB6iW7YAcZvJ for <ace@ietfa.amsl.com>; Sun, 1 Oct 2017 02:35:15 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0865213471D for <Ace@ietf.org>; Sun, 1 Oct 2017 02:35:13 -0700 (PDT)
Received: from [192.168.91.203] ([80.92.122.248]) by mail.gmx.com (mrgmx001 [212.227.17.190]) with ESMTPSA (Nemesis) id 0MFcg9-1e4JHx0MvF-00EhqG for <Ace@ietf.org>; Sun, 01 Oct 2017 11:35:12 +0200
To: "Ace@ietf.org" <Ace@ietf.org>
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
Message-ID: <55ac5e55-2570-6126-2211-a6c1b65c3006@gmx.net>
Date: Sun, 01 Oct 2017 11:35:11 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K0:KBnVDx6o6ytBIp0q+wvqBCF1NRHZSZIwmrfLtU23PJmN6zm4gOD SyVK5ginGSeKMLQ/Ktf24PpV72SFs2l/uP+MMT7jx4/KkfY+KlwqO2FYousdkHHsEUjosXK ZsoZ/t9NpMcOlQdDKuT+H1XcPsOODwVyE2cXuU9nfnkl2m4j80+2+TU+PmXlvuBZjhUTXGL 2nkXrK1LGlq+ECuD/eF+g==
X-UI-Out-Filterresults: notjunk:1;V01:K0:H7exc/7yz+k=:LXiAZwRGDzQrcDzcqkQKe8 3yfM+uXpB/+Mnhtr2NxhDEnE4gPz/YEnSLw2r2dxIspgr6TGPOkqiG4NLaHW0diJ21WdQQA9A SMCToGlS8qgosbGpP7Lv17zp6p/J8hezNkOicdeSFxH/3lGLLrHxDaDMclL1xfVkjE+QrnapW rAy/yV1x1U2LmgMFzTbx0Hu/DiuQut/PF9yU24GJz7R2g7kwyrapie6+JEfiWC4bKmRYBv+Y+ lcMbtmBNXYY+7runAKv0pLHMGi3QiCgMXmV8Sbqs0QaKiNeZoXi0gosj8ky7EcOcvv89SoPR7 vGn0Fe6FTZRM1CLJUSpcZknAYCmdCZ/p8FOSCEJD4wpedRuzp/yvShMCPJFaLb/xcSK70Rqg4 MavoUgssVbvfVd3MLNh+G5UcF51crxBJEOgcbhf29J28PRGveMMGFt2Twd+sBAr9E4bafoKox USDnjm3UUw8fqiH7C8slwiFNdNhc2JtRrqD3ZTNas+Qwbw+yLZ2SoASNth6h3KMa1sU+EjKI/ dV302u0BfSKGKvX1EtukxwatnhN/Ma5qXJeVmo+4nPnAqHcXfpgpv4zB7SjfhxGSlJO2ZD1s5 3mw/vojfRrmGqD7cBuIXXelG+VEWh0b/1CVvbb5sX+ztZHCbyIOdN6kSjJBUdPygLivWXeEnv 7b9+Z5TJeUTuKC8nHit1lbvytyaMfvE8eb/nB2mZL9+qYbrseX8l5NWiIbg1qQnY2Mgt5wRDq uEBcSfIhFUNFtkfVIb+6p6uh6bYuk+505kwP1UeavtHaEUx5ifTtl1k4jJ9Io7yxH9L6agivx /IiBGFuNknyePrsCNTdaCQE4YRsjNkoMyD2OufzLNoWiFqNryU=
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/UaXs9ynTiB7hQY8u9BWuZ29LcOI>
Subject: [Ace] draft-ietf-ace-dtls-authorize-01
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Oct 2017 09:35:17 -0000
[chair hat off] Hi all, I took a look at the draft and noticed a few minor things: - The document should talk about "profiles" rather than "profile" since it specifies at least two profiles, namely the RPK and the PSK profiles with DTLS. I suspect an implementation is only expected to implement one of them rather than both. - Editorial comment: most of the articles are missing, which makes the document harder to read. - AS discovery: Wouldn't the client need to know the AS upfront when using RPK and PSK (since it has to share a PSK with the AS or, in case of the RPK, has to have the RPK with the server exchanged out of band)? - There are two options provided for conveying the access token to the RS, either either a dedicated endpoint or inband within the DTLS exchange. There are pros and cons regarding the usage of both; is the idea to settle with one approach in the end or do you envision both options to be available in the final version of the specification. - Regarding the dynamic update of authorization information. Since the access token is a PoP token I believe you will have to demonstrate the possession of the key every time you change the access token. (Section 2.4 gives me a different impression.) - When the access token is conveyed inband in DTLS as part of the PSK_identity then the text on page 12 is applicable. The description in CDDL format confuses me. Normally, it should be quite simple: either you transmit a psk_identity field or you convey the access token. The server would figure it out. Is this just a complicated way to express this semantic or do you have something else in mind? (Btw, my understanding is that the server does not need to send a illegal_parameter alert when it the psk_identity does not lead to a successful authentication. Is this your suggestion or is this taken from TLS PSK?) - What is the reasoning behind this statement: "This specification mandates that at least the key derivation algorithm "HKDF SHA-256" as defined in [I-D.ietf-cose-msg] MUST be supported." I would have assumed at the session key provided by the AS to the client and the key embedded in the access token is used directly within TLS as a PSK. - Could you explain this statement: " If the security association with RS still exists and RS has indicated support for session renegotiation according to [RFC5746], the new Access Token MAY be used to renegotiate the existing DTLS session. In this case, the Access Token is used as "psk_identity" as defined in Section 4.1. The Client MAY also perform a new DTLS handshake according to Section 4.1 that replaces the existing DTLS session. " What are you trying to accomplish? Do you expect authorization information to change frequently? What security association are you talking about in the paragraph above? Ciao Hannes
- [Ace] draft-ietf-ace-dtls-authorize-01 Hannes Tschofenig
- Re: [Ace] draft-ietf-ace-dtls-authorize-01 Ludwig Seitz
- Re: [Ace] draft-ietf-ace-dtls-authorize-01 Olaf Bergmann