Re: [Ace] [EXTERNAL] Francesca Palombini's Discuss on draft-ietf-ace-oauth-authz-38: (with DISCUSS and COMMENT)

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Thu, 25 March 2021 14:38 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB45E3A2431; Thu, 25 Mar 2021 07:38:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=TBgZ6EJf; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=TBgZ6EJf
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6aEliRLzKKwh; Thu, 25 Mar 2021 07:38:25 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80075.outbound.protection.outlook.com [40.107.8.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D9B93A242E; Thu, 25 Mar 2021 07:38:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OLNQG6+qLy8OfsNtYXCdXaXpn658A3SDAF8rwvttMEg=; b=TBgZ6EJfGI/Bt6l6akTSieBc/h4BvPiQnspcr1qpWdK6qZ7Ry6htpUHrGDpyc/OoEycESBKgU61z4iQDXXbY96da+XgF5tBn4oASsqoy6Xwx/TN0VZc9ibXYcqTO6BmgTa6vR7OM5AkFNmtcQ3qwNdG7sVV+WJciJwh4uyuBC7Q=
Received: from DB6PR0501CA0009.eurprd05.prod.outlook.com (2603:10a6:4:8f::19) by HE1PR0802MB2330.eurprd08.prod.outlook.com (2603:10a6:3:c8::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.25; Thu, 25 Mar 2021 14:38:15 +0000
Received: from DB5EUR03FT022.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:8f:cafe::e2) by DB6PR0501CA0009.outlook.office365.com (2603:10a6:4:8f::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.28 via Frontend Transport; Thu, 25 Mar 2021 14:38:15 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT022.mail.protection.outlook.com (10.152.20.171) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.25 via Frontend Transport; Thu, 25 Mar 2021 14:38:15 +0000
Received: ("Tessian outbound 7d88ebbbfeee:v89"); Thu, 25 Mar 2021 14:38:15 +0000
X-CR-MTA-TID: 64aa7808
Received: from 5e226557377e.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 789CB6E9-1594-4677-AB0E-89CDE99F3742.1; Thu, 25 Mar 2021 14:38:09 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5e226557377e.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 25 Mar 2021 14:38:09 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MabB4bEgpP4MRsaaBDZ8ecBJEyraBqTsSyhKuwsP/ooNbSyVNxzk2H9o1bMTHHAHQlHPhR9Q9T54b/ETk30MvZdiUuuoojn9LLu+I3ouDuh+jCgMzDeWVg2mpOP+xWeDzaqVQXUep+WAp5sl+0n/VIGUSkHkF31aR0PXdx9J44Zy6XL+5WB5M44wHl6fullvRf0e2JD106IH0LdvxK3fTW5Psmnyw53lbYExjQn5NlzjDTLxYQXTT9oA8KipoypHj5ZVGmpCJtulSN+WRXJk3WtWq6lkzEF56agZKSds+IdHFZBChx/E6pbscAWY+te4562XhPO3OZxPkkzgV9Ch3Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OLNQG6+qLy8OfsNtYXCdXaXpn658A3SDAF8rwvttMEg=; b=GWGgRsnuVg4n7KvBOYJfcfJSGy7ns7MehkyK+UW2gA45KG+48UVzKkrikz9EZm+KoHvw00nTuwzGUB4ghFJFwJrScJdRSnGwfLjabtj+j+Bm9bZsSjEvjLtiOrriCZ4Qn4OOtMgF03evmg/w6O0GzcO1xafsRhGT2n56oI3bStJjWKEEE5tulXk0V7NPcAyxG9pQpaVGoU3ZyLRckD88IOqYd7e+7XXLgwkgXAIqQ8NTPd1EF424U6++R6btBthfh7VI1293gEySdTEo37AvSSOGf1UXB2jjK+GSM9dYGzYpStgYjt01VOHUUzRhyJmd9BSLusT2WnNyJNcF7gMjgw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=OLNQG6+qLy8OfsNtYXCdXaXpn658A3SDAF8rwvttMEg=; b=TBgZ6EJfGI/Bt6l6akTSieBc/h4BvPiQnspcr1qpWdK6qZ7Ry6htpUHrGDpyc/OoEycESBKgU61z4iQDXXbY96da+XgF5tBn4oASsqoy6Xwx/TN0VZc9ibXYcqTO6BmgTa6vR7OM5AkFNmtcQ3qwNdG7sVV+WJciJwh4uyuBC7Q=
Received: from VI1PR08MB2639.eurprd08.prod.outlook.com (2603:10a6:802:25::13) by VI1PR08MB5471.eurprd08.prod.outlook.com (2603:10a6:803:137::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3977.29; Thu, 25 Mar 2021 14:38:07 +0000
Received: from VI1PR08MB2639.eurprd08.prod.outlook.com ([fe80::99ef:85aa:3465:475e]) by VI1PR08MB2639.eurprd08.prod.outlook.com ([fe80::99ef:85aa:3465:475e%7]) with mapi id 15.20.3977.025; Thu, 25 Mar 2021 14:38:07 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Cigdem Sengul <cigdem.sengul@gmail.com>, Francesca Palombini <francesca.palombini=40ericsson.com@dmarc.ietf.org>
CC: Seitz Ludwig <ludwig.seitz@combitech.se>, The IESG <iesg@ietf.org>, "art-ads@ietf.org" <art-ads@ietf.org>, "ace-chairs@ietf.org" <ace-chairs@ietf.org>, "draft-ietf-ace-oauth-authz@ietf.org" <draft-ietf-ace-oauth-authz@ietf.org>, "ace@ietf.org" <ace@ietf.org>
Thread-Topic: [Ace] [EXTERNAL] Francesca Palombini's Discuss on draft-ietf-ace-oauth-authz-38: (with DISCUSS and COMMENT)
Thread-Index: AQHXILzzcyF6YeG7q0+zjz8FZ7Zpo6qUVU4AgABlk4CAAASzAIAABS+g
Date: Thu, 25 Mar 2021 14:38:07 +0000
Message-ID: <VI1PR08MB26398972B10DF5D9B6A0C7C0FA629@VI1PR08MB2639.eurprd08.prod.outlook.com>
References: <161659738410.3239.3955409176349739508@ietfa.amsl.com> <fd47667ea52e432e947a35a886157865@combitech.se> <C4B30675-2945-4295-A24A-803219F04C08@ericsson.com> <CAA7SwCMYiSDc5nyG_7en7VqQtZq+0T4bobbbh8MwOVodMMr5qw@mail.gmail.com>
In-Reply-To: <CAA7SwCMYiSDc5nyG_7en7VqQtZq+0T4bobbbh8MwOVodMMr5qw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 99DEC63A14B76C4F91EE344EBB1ED4C3.0
x-checkrecipientchecked: true
Authentication-Results-Original: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [217.140.99.251]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: f4681245-1814-4832-ed8b-08d8ef9b9fd8
x-ms-traffictypediagnostic: VI1PR08MB5471:|HE1PR0802MB2330:
X-Microsoft-Antispam-PRVS: <HE1PR0802MB2330C3C8089529F60D6DE594FA629@HE1PR0802MB2330.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:10000;OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: YKAWK+z79gtjREJAwz3aGVDxcMXzWuojR9BAk4Y0Bm8m6YM0HQYVf2OkXn3HYOlqXAxKQBO4afPuNDeUpb6vR7zlp0SPrCnhJuUToEiopkBNoGrOl8v4F4ioLKfy/pPxOqLegMuJ19yPKFZuKQNbX8o0Ksn0GuBklAr5+JJZsepVSv+FT/j8q2Qkh3Cke3K9M4Mu9wxwFeSBHCH+r6Thmb22sNfgKGn6hlzNg3P3p5SD+8RHdAG+c9EK+/O6z5ahfLoGfpuvxygDdeN3wrmU/zux3f+1HseumhHuDlIn0g8dQh7ijDmykQB6CG+EVl0L82bHfUG4ZMXb5IR3J86JmHaczf+Edfw1UV/NWLZ+255dhkFftB0mNQ8L5d71V4E1MW5U4CQb/YRrd69iQPysuqzSejRlFaJWOeQI3d286JR7A3p9WJtRdOeAOMP3syZwg3r5JYr97Ks1GyeDw7CNYFwrNlnd4hzcl5F0WWCErXHDIRY+XbRNdsuGzpy0klxKQtOBMJUKjBpgP5kXlrKogGylsUh5Ib44HPxs+9l24STeaa2NXy8UgBZZyJCdP1y4G6yhX6Od0A0arE+kcL2LcgkiMYq38cVbJ5AnNMn4Sc8CgD8tj/6qlfR0VBO60mmDsnzk1Z1MrnnhqJlyVFnZplyi8c6BKS2lILwKL5SGfuDX/YBBX+h+xh+T4B809e4xCu1/ZlbvSX131aTnD99GrCgupYNz9tsLnSLQU708RaY=
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:VI1PR08MB2639.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(39860400002)(136003)(366004)(396003)(76116006)(66476007)(64756008)(66556008)(86362001)(66446008)(66946007)(9686003)(55016002)(5660300002)(8676002)(8936002)(7696005)(71200400001)(38100700001)(26005)(186003)(53546011)(6506007)(30864003)(33656002)(52536014)(54906003)(110136005)(4326008)(966005)(2906002)(478600001)(316002)(83380400001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5471
Original-Authentication-Results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT022.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 9af9aa5b-feb5-4c21-c69f-08d8ef9b9aff
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(396003)(346002)(136003)(39860400002)(376002)(36840700001)(46966006)(47076005)(5660300002)(6506007)(30864003)(53546011)(33656002)(110136005)(36860700001)(316002)(478600001)(7696005)(966005)(2906002)(356005)(8676002)(82310400003)(4326008)(9686003)(336012)(8936002)(83380400001)(81166007)(55016002)(26005)(82740400003)(54906003)(70206006)(70586007)(86362001)(52536014)(186003)(450100002); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Mar 2021 14:38:15.3498 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: f4681245-1814-4832-ed8b-08d8ef9b9fd8
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT022.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2330
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/_qt04CHPNpBDVefv2SOJTu-OJn4>
Subject: Re: [Ace] [EXTERNAL] Francesca Palombini's Discuss on draft-ietf-ace-oauth-authz-38: (with DISCUSS and COMMENT)
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Mar 2021 14:38:30 -0000

Hi all,

what is the motivation for re-opening the discussion about this aspect? This was discussed in the working group before and we reached a conclusion about what we want to support.

The use of HTTP/JSON is extremely useful.

Ciao
Hannes

-----Original Message-----
From: Cigdem Sengul <cigdem.sengul@gmail.com>
Sent: Thursday, March 25, 2021 3:10 PM
To: Francesca Palombini <francesca.palombini=40ericsson.com@dmarc.ietf.org>
Cc: Seitz Ludwig <ludwig.seitz@combitech.se>; The IESG <iesg@ietf.org>; art-ads@ietf.org; ace-chairs@ietf.org; draft-ietf-ace-oauth-authz@ietf.org; ace@ietf.org
Subject: Re: [Ace] [EXTERNAL] Francesca Palombini's Discuss on draft-ietf-ace-oauth-authz-38: (with DISCUSS and COMMENT)

Hello,
I would like to add my two cents to this as the MQTT-TLS profile does use HTTP/JSON for client-AS and rs-AS communication as similar already was supported in MQTT implementations between an MQTT broker and external servers (e.g., via auth plug-ins).

For points like 13: Making CBOR mandatory would break how it is implemented for MQTT-TLS, which implements the AS creation hints as a User Property inside an MQTT message.
"The User Property is a UTF-8 string pair, composed of a name and a value.
The name of the User Property MUST be set to
   "ace_as_hint".  The value of the user property is a UTF-8 encoded
   JSON string containing the mandatory "AS" parameter, and the optional
   parameters "audience", "kid", "cnonce", and "scope" as defined in
   Section 5.1.2 of the ACE framework"

Kind regards,
--Cigdem



On Thu, Mar 25, 2021 at 1:53 PM Francesca Palombini <francesca.palombini= 40ericsson.com@dmarc.ietf.org> wrote:

> Ludwig,
>
> Thank you for the quick reply, and for the useful background information.
>
> As I said, I think this document is important and should move forward
> asap, and it can do so without changing the main assumptions, with
> some additional clarifications in the text about CBOR vs "other" when
> HTTP is used (which in my opinions are necessary - see points 1, 8,
> 10, 11, 13, 15, 17, 22, 23, 26, 28).
>
> What I wanted to highlight is that it would simplify the document a
> lot to just remove this flexibility, for which I don't understand the
> motivation, and say "CBOR is mandatory" even when HTTP is used. The
> flexibility could be added in a future document if needed. However, I
> understand that there is history in the working group, and I will step
> back and remove my DISCUSS if I am in the rough. Note however that in
> terms of work on the document I suspect that keeping this flexibility will require more work, not less.
>
> Looking forward to discussing this with Ben during the telechat.
> Francesca
>
> On 25/03/2021, 08:50, "iesg on behalf of Seitz Ludwig" <
> iesg-bounces@ietf.org on behalf of ludwig.seitz@combitech.se> wrote:
>
>     Hello Francesca,
>
>     Thank you for your review. I will address your detailed comments
> separately, with regards to your DISCUSS:
>
>     The option to allow both HTTP and JSON for any leg of the
> communication (client-AS, rs-AS, client-rs) was the result of long
> discussions in the WG. If I recall correctly the intent was to allow
> legacy OAuth 2.0 equipment (i.e. not supporting ACE) to be used in ACE
> interactions on those legs of the communication where no constrained
> devices are involved.
>     I am reluctant to reopen these discussions at this point in time,
> and I suspect doing the necessary analysis to provide in-depth
> considerations on the choices between HTTP/CoAP and JSON/CBOR will
> significantly delay the progress of this document.
>
>     @ace-chairs: What is your suggestion on how to best handle this?
>     (Please note that I am unable to commit significant amounts of
> time to this work in the foreseeable future)
>
>     Regards,
>
>     Ludwig
>
>
>     > -----Original Message-----
>     > From: Ace <ace-bounces@ietf.org> On Behalf Of Francesca
> Palombini via
>     > Datatracker
>     > Sent: den 24 mars 2021 15:50
>     > To: The IESG <iesg@ietf.org>
>     > Cc: art-ads@ietf.org; ace-chairs@ietf.org; draft-ietf-ace-oauth-
>     > authz@ietf.org; ace@ietf.org
>     > Subject: [EXTERNAL] [Ace] Francesca Palombini's Discuss on
> draft-ietf-ace-
>     > oauth-authz-38: (with DISCUSS and COMMENT)
>     >
>     > Francesca Palombini has entered the following ballot position for
>     > draft-ietf-ace-oauth-authz-38: Discuss
>     >
>     > When responding, please keep the subject line intact and reply
> to all email
>     > addresses included in the To and CC lines. (Feel free to cut
> this introductory
>     > paragraph, however.)
>     >
>     >
>     > Please refer to
> https://www.ietf.org/iesg/statement/discuss-criteria.html
>     > for more information about IESG DISCUSS and COMMENT positions.
>     >
>     >
>     > The document, along with other ballot positions, can be found here:
>     > https://datatracker.ietf.org/doc/draft-ietf-ace-oauth-authz/
>     >
>     >
>     >
>     >
> ----------------------------------------------------------------------
>     > DISCUSS:
>     >
> ----------------------------------------------------------------------
>     >
>     > Thank you for this document. I think this is an important
> document which
>     > should move forward, but I would like to discuss some points
> before it does
>     > so. These might result in simple clarifications, or might
> require more
>     > discussion, but I do hope they help improve the document.
>     >
>     > General comments:
>     >
>     > I found confusing to understand how optional or mandatory is the
> use of
>     > CBOR for profiles of this specification compared to the
> transport used. I
>     > understand the need for flexibility, but maybe it should be
> clarified the
>     > implication of using CoAP (is CBOR mandatory then?) vs HTTP (is
> CBOR always
>     > permitted? How is the encoding in that case? Is the same media type
>     > application/ace+cbor used in that case?). Note also that while
> requests
>     > include the content type to use, both in case HTTP or CoAP+CBOR
> are used,
>     > the response don't seem to include this information.
>     >
>     > I would like it to be clarified what requirements (or even just
>     > recommendations) are there to use CoAP vs HTTP for different
> legs of the
>     > exchange - not necessarily remove the flexibility but to clarify for
>     > implementers what can be done and what would be the reasoning to do
>     > that: for example if both endpoints support HTTP with the AS,
> most likely you
>     > can have HTTP between C and RS, so does it really make sense to
> run this
>     > instead of OAuth 2.0? Right now all is permitted, but does it
> all make sense? I
>     > feel like this type of considerations are missing. As a note - I
> am not sure
>     > what allowing a different encoding than CBOR for any leg of the
> exchange
>     > adds to the specification - it makes things more confusing, and
> if needed it
>     > could be specified in another document.
>     >
>     > While going through and thinking about encodings (assuming we
> keep the
>     > doc as is with regards to allowing more than just CBOR), I
> wondered if it
>     > would be better to define a new media type to use when the ACE
>     > framework is used with HTTP, to differentiate from OAuth 2.0,
> since some of
>     > the endpoints used are the same (/token and /introspect at the AS).
> I am
>     > interested to hear more from my co-AD as well if this would be
> an OK use of
>     > a new media type - I am thinking of the case where AS is
> supporting both
>     > OAuth 2.0 and the Ace framework - or if it is unnecessary, since the
>     > encodings are the same, and the parameters are registered in
> OAuth
> 2.0
>     > registry.
>     >
>     > More detailed comments below.
>     > Francesca
>     >
>     >
>     >
> ----------------------------------------------------------------------
>     > COMMENT:
>     >
> ----------------------------------------------------------------------
>     >
>     > Detailed comments:
>     >
>     > 1. -----
>     >
>     >    sufficiently compact.  CBOR is a binary encoding designed for
> small
>     >    code and message size, which may be used for encoding of self
>     >    contained tokens, and also for encoding payloads transferred in
>     >    protocol messages.
>     >
>     > FP: "may be used" make it seem as if CBOR is always optional
> (even when
>     > CoAP is used). See points 11. and 13. for examples of text that
> seem to imply
>     > that CBOR is mandatory in some cases.
>     >
>     > 2. -----
>     >
>     >       Refresh tokens are issued to the client by the authorization
>     >       server and are used to obtain a new access token when the
> current
>     >       access token becomes invalid or expires, or to obtain
> additional
>     >
>     > FP: token validity - it is not clear what it means for a token
> to become invalid
>     > (vs expiring). As this is the first time it is mentioned, it
> should be explained
>     > here or referenced.
>     >
>     > 3. -----
>     >
>     >          An asymmetric key pair is generated on the token's recipient
>     >          and the public key is sent to the AS (if it does not already
>     >
>     >           inside the token and sent back to the requesting party.
> The
>     >          consumer of the token can identify the public key from the
>     >
>     >  FP: "token's recipient" and "consumer of the token" - why not
> talk about
>     > client and resource server here? It would fit better with the
> terminology
>     > used  in the rest of the document.
>     >
>     >  4. -----
>     >
>     >     This framework RECOMMENDS the use of CoAP as replacement for HTTP
>     > for
>     >    use in constrained environments.  For communication security this
>     >
>     > FP: This was already stated in the introduction in the following
> sentence:
>     >
>     >    of processing capabilities, available memory, etc.  For web
>     >    applications on constrained nodes, this specification RECOMMENDS
> the
>     >    use of the Constrained Application Protocol (CoAP) [RFC7252] as
>     >    replacement for HTTP.
>     >
>     > Not sure repeating is useful.
>     >
>     > 5. -----
>     >
>     >    OAuth 2.0 (such as [RFC7521] and [RFC8628]).  What grant types
> works
>     >    best depends on the usage scenario and [RFC7744] describes many
>     >    different IoT use cases but there are two preferred grant types,
>     >    namely the Authorization Code Grant (described in Section 4.1 of
>     >
>     > FP: nit: s/works/work . I think "preferred" is probably not the
> right term
>     > here, and should be rephrased or clarified - preferred respect to?
>     >
>     > 6. -----
>     >
>     >       In addition to the response parameters defined by OAuth 2.0 and
>     >       the PoP access token extension, this framework defines
> parameters
>     >       that can be used to inform the client about capabilities of the
>     >       RS, e.g. the profiles the RS supports.  More information about
>     >
>     > FP: I believe this is a leftover from a previous version of the
> document, but
>     > should be "profile" and not "profiles" as the AS is only allowed to
>     > communicate one profile to the client and RS - see for example
> the following
>     > sentences:
>     >
>     >       The Client and the RS mutually authenticate using the security
>     >       protocol specified in the profile (see step B) and the keys
>     >
>     >       The AS informs the client of the selected profile using the
>     >       "ace_profile" parameter in the token response.
>     >
>     > 7. -----
>     >
>     >          (1) the client sends the access token containing, or
>     >          referencing, the authorization information to the RS, that
> may
>     >          be used for subsequent resource requests by the client, and
>     >
>     > FP: s/may/will
>     >
>     > 8. -----
>     >
>     >       While the structure and encoding of the access token varies
>     >       throughout deployments, a standardized format has been defined
>     >       with the JSON Web Token (JWT) [RFC7519] where claims are
> encoded
>     >       as a JSON object.  In [RFC8392], an equivalent format using
> CBOR
>     >       encoding (CWT) has been defined.
>     >
>     > FP: Would it make sense to RECOMMEND the use of JWT when HTTP is
> used?
>     > Or is CWT always RECOMMENDED?
>     >
>     > 9. -----
>     >
>     >    parameters.  When profiles of this framework use CoAP instead, it
> is
>     >    REQUIRED to use of the following alternative instead of Uri-query
>     >    parameters: The sender (client or RS) encodes the parameters of
> its
>     >    request as a CBOR map and submits that map as the payload of the
> POST
>     >    request.
>     >
>     > FP: I think it should be better defined (or at least hinted in
> this
> paragraph)
>     > the mapping between the CBOR encoded parameters and the Uri-query
>     > parameters:
>     > are they all encoded as CBOR text strings?
>     >
>     > 10. -----
>     >
>     >    Applications that use this media type: The type is used by
>     >    authorization servers, clients and resource servers that support
> the
>     >    ACE framework as specified in [this document].
>     >
>     > FP: I suggest adding "that support the ACE framework with CBOR
> encoding,
>     > as specified ..."
>     >
>     > 11. -----
>     >
>     >    The OAuth 2.0 AS uses a JSON structure in the payload of its
>     >    responses both to client and RS.  If CoAP is used, it is REQUIRED
> to
>     >    use CBOR [RFC8949] instead of JSON.  Depending on the profile, the
>     >    CBOR payload MAY be enclosed in a non-CBOR cryptographic wrapper
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.