[Ace] draft-ietf-ace-dtls-authorize-01

Hannes Tschofenig <hannes.tschofenig@gmx.net> Sun, 01 October 2017 09:35 UTC

Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F273B13471B for <ace@ietfa.amsl.com>; Sun, 1 Oct 2017 02:35:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cB6iW7YAcZvJ for <ace@ietfa.amsl.com>; Sun, 1 Oct 2017 02:35:15 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.15.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0865213471D for <Ace@ietf.org>; Sun, 1 Oct 2017 02:35:13 -0700 (PDT)
Received: from [192.168.91.203] ([80.92.122.248]) by mail.gmx.com (mrgmx001 [212.227.17.190]) with ESMTPSA (Nemesis) id 0MFcg9-1e4JHx0MvF-00EhqG for <Ace@ietf.org>; Sun, 01 Oct 2017 11:35:12 +0200
To: "Ace@ietf.org" <Ace@ietf.org>
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
Message-ID: <55ac5e55-2570-6126-2211-a6c1b65c3006@gmx.net>
Date: Sun, 01 Oct 2017 11:35:11 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.3.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K0:KBnVDx6o6ytBIp0q+wvqBCF1NRHZSZIwmrfLtU23PJmN6zm4gOD SyVK5ginGSeKMLQ/Ktf24PpV72SFs2l/uP+MMT7jx4/KkfY+KlwqO2FYousdkHHsEUjosXK ZsoZ/t9NpMcOlQdDKuT+H1XcPsOODwVyE2cXuU9nfnkl2m4j80+2+TU+PmXlvuBZjhUTXGL 2nkXrK1LGlq+ECuD/eF+g==
X-UI-Out-Filterresults: notjunk:1;V01:K0:H7exc/7yz+k=:LXiAZwRGDzQrcDzcqkQKe8 3yfM+uXpB/+Mnhtr2NxhDEnE4gPz/YEnSLw2r2dxIspgr6TGPOkqiG4NLaHW0diJ21WdQQA9A SMCToGlS8qgosbGpP7Lv17zp6p/J8hezNkOicdeSFxH/3lGLLrHxDaDMclL1xfVkjE+QrnapW rAy/yV1x1U2LmgMFzTbx0Hu/DiuQut/PF9yU24GJz7R2g7kwyrapie6+JEfiWC4bKmRYBv+Y+ lcMbtmBNXYY+7runAKv0pLHMGi3QiCgMXmV8Sbqs0QaKiNeZoXi0gosj8ky7EcOcvv89SoPR7 vGn0Fe6FTZRM1CLJUSpcZknAYCmdCZ/p8FOSCEJD4wpedRuzp/yvShMCPJFaLb/xcSK70Rqg4 MavoUgssVbvfVd3MLNh+G5UcF51crxBJEOgcbhf29J28PRGveMMGFt2Twd+sBAr9E4bafoKox USDnjm3UUw8fqiH7C8slwiFNdNhc2JtRrqD3ZTNas+Qwbw+yLZ2SoASNth6h3KMa1sU+EjKI/ dV302u0BfSKGKvX1EtukxwatnhN/Ma5qXJeVmo+4nPnAqHcXfpgpv4zB7SjfhxGSlJO2ZD1s5 3mw/vojfRrmGqD7cBuIXXelG+VEWh0b/1CVvbb5sX+ztZHCbyIOdN6kSjJBUdPygLivWXeEnv 7b9+Z5TJeUTuKC8nHit1lbvytyaMfvE8eb/nB2mZL9+qYbrseX8l5NWiIbg1qQnY2Mgt5wRDq uEBcSfIhFUNFtkfVIb+6p6uh6bYuk+505kwP1UeavtHaEUx5ifTtl1k4jJ9Io7yxH9L6agivx /IiBGFuNknyePrsCNTdaCQE4YRsjNkoMyD2OufzLNoWiFqNryU=
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/UaXs9ynTiB7hQY8u9BWuZ29LcOI>
Subject: [Ace] draft-ietf-ace-dtls-authorize-01
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 01 Oct 2017 09:35:17 -0000

[chair hat off]

Hi all,

I took a look at the draft and noticed a few minor things:

- The document should talk about "profiles" rather than "profile" since
it specifies at least two profiles, namely the RPK and the PSK profiles
with DTLS. I suspect an implementation is only expected to implement one
of them rather than both.

- Editorial comment: most of the articles are missing, which makes the
document harder to read.

- AS discovery: Wouldn't the client need to know the AS upfront when
using RPK and PSK (since it has to share a PSK with the AS or, in case
of the RPK, has to have the RPK with the server exchanged out of band)?

- There are two options provided for conveying the access token to the
RS, either either a dedicated endpoint or inband within the DTLS
exchange. There are pros and cons regarding the usage of both; is the
idea to settle with one approach in the end or do you envision both
options to be available in the final version of the specification.

- Regarding the dynamic update of authorization information. Since the
access token is a PoP token I believe you will have to demonstrate the
possession of the key every time you change the access token. (Section
2.4 gives me a different impression.)

- When the access token is conveyed inband in DTLS as part of the
PSK_identity then the text on page 12 is applicable. The description in
CDDL format confuses me. Normally, it should be quite simple: either you
transmit a psk_identity field or you convey the access token. The server
would figure it out. Is this just a complicated way to express this
semantic or do you have something else in mind?
(Btw, my understanding is that the server does not need to send a
illegal_parameter alert when it the psk_identity does not lead to a
successful authentication. Is this your suggestion or is this taken from
TLS PSK?)

- What is the reasoning behind this statement:

   "This specification mandates that at least the key derivation
   algorithm "HKDF SHA-256" as defined in [I-D.ietf-cose-msg] MUST be
   supported."

I would have assumed at the session key provided by the AS to the client
and the key embedded in the access token is used directly within TLS as
a PSK.

- Could you explain this statement:
"
   If the security association with RS still exists and RS has indicated
   support for session renegotiation according to [RFC5746], the new
   Access Token MAY be used to renegotiate the existing DTLS session.
   In this case, the Access Token is used as "psk_identity" as defined
   in Section 4.1.  The Client MAY also perform a new DTLS handshake
   according to Section 4.1 that replaces the existing DTLS session.
"

What are you trying to accomplish? Do you expect authorization
information to change frequently? What security association are you
talking about in the paragraph above?

Ciao
Hannes