Re: [Ace] Review of draft-ietf-ace-coap-est-oscore-00

Marco Tiloca <marco.tiloca@ri.se> Thu, 11 May 2023 16:06 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2039C05E028 for <ace@ietfa.amsl.com>; Thu, 11 May 2023 09:06:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.096
X-Spam-Level:
X-Spam-Status: No, score=-2.096 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mc9VGVhOZP8u for <ace@ietfa.amsl.com>; Thu, 11 May 2023 09:06:54 -0700 (PDT)
Received: from GVYP280CU001.outbound.protection.outlook.com (mail-swedencentralazlp170120004.outbound.protection.outlook.com [IPv6:2a01:111:f403:c202::4]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C230C17B341 for <ace@ietf.org>; Thu, 11 May 2023 09:06:53 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=IngMGCf1YydZI3NdAcLWU7uLhiLIP9+bK2tRypQMhmfp8i6Da8uLBuy5JJ8DAEngDTjh/shK0xIkv2T+oZUm9UQum9zxBB+ixNh7SanyobuHUri4Gnjf1LYTGb/leylhvsJxrIjXTFUaSqP9xCnmFVRC2bwl1koPEGIoLuTIHjB6fi+vBnW37q6CW9OKz5nJxk4JWQzUO+1WaG6pp1IY5FrYPYhhE3oZakEo0pieVONk/Gm/4/cWehaOT/9jNsqhIHhjq/8pRXp16fFGxJbIZAZ6WJcgXUjOBBr5ECASUKxIuvmjmzNBL7n34cFje/4NiULEpNlOSJcW4ePk2uAKnQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=l59ShIfFIspGdRLQ813DQC7NibQBnRMH+e4cvIKH+is=; b=DNtdtHuzwNAnwrGXLMHq5I2ssH6SJnRPkWtnKuhLGCb5yTXZERttXnSuqcd0ruyAurfE4bX5sz0oaW7qWRVUXxAwY1tNNhFNOqm/GBrfwUbBlL2INuibQjbtVmyItqOROntmyCgYq/2RMHDI7+lF1RYpV9w/vURI3jsNHP6RrTlZq2D2McCX5r6E86etSMI+S+heXCkjD5XQh8C6Nqq+mbeYYAQ3SHEGIJLjUAn5Yt4y1cMwcEbnSlBStqjl2Ah3wZULBoRkuykhKOX/KRvk9kuxvRoq/Quko6i6CHN8USfIongAzPSPkzGzWa5m1K9RxTbJYiRRPD5cTQ5UUolRBA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=l59ShIfFIspGdRLQ813DQC7NibQBnRMH+e4cvIKH+is=; b=GzwqoFl+GSXf7EBfGvQi5pSyBwR43M+3joKcag7791+TzrWnjw5FhxzVnhDOqlVBIpA0dZtH+5+Dm2UCnCAF2rpsXOsz3pQFVHeCvYEdmAjboY8UriqdWOBJ/fkBeLrEEFLx+aPUe5Y3UNhArUxpfyyXzSe5hA3UEnurgnVD7/c=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by MM1PPF2F7DF6941.SWEP280.PROD.OUTLOOK.COM (2603:10a6:184::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6277.36; Thu, 11 May 2023 16:06:47 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::c0b1:e5f:ef9b:2dde]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::c0b1:e5f:ef9b:2dde%5]) with mapi id 15.20.6387.022; Thu, 11 May 2023 16:06:47 +0000
Message-ID: <af2ab479-51a6-4a74-e2f1-ac9a7ad9344d@ri.se>
Date: Thu, 11 May 2023 18:06:44 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.10.0
Content-Language: en-US
To: Mališa Vučinić <malisa.vucinic@inria.fr>, Marco Tiloca <marco.tiloca=40ri.se@dmarc.ietf.org>
Cc: Ace Wg <ace@ietf.org>
References: <a6bad0ac-2101-d764-04ff-a1c3796e8ad3@ri.se> <1CAE5AB2-5F5A-4B4C-9CEA-8BA6C598B278@inria.fr>
From: Marco Tiloca <marco.tiloca@ri.se>
In-Reply-To: <1CAE5AB2-5F5A-4B4C-9CEA-8BA6C598B278@inria.fr>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------xUo7grdc7l0EHP0OLPvNkZTp"
X-ClientProxiedBy: FR2P281CA0136.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:9e::18) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|MM1PPF2F7DF6941:EE_
X-MS-Office365-Filtering-Correlation-Id: 733cbd17-94ab-4c01-4414-08db5239b8a2
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230028)(4636009)(136003)(39850400004)(376002)(366004)(396003)(346002)(451199021)(31686004)(966005)(6486002)(33964004)(478600001)(4326008)(316002)(66946007)(110136005)(66556008)(66476007)(6666004)(45080400002)(36756003)(66574015)(53546011)(6512007)(26005)(8676002)(83380400001)(21480400003)(2906002)(8936002)(30864003)(6506007)(44832011)(2616005)(235185007)(86362001)(186003)(38100700002)(5660300002)(31696002)(166002)(41300700001)(45980500001)(43740500002)(579004)(559001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 60aNRsuZWsrQGpquy9sTJikddNQu/CgH/s4hLN1HokUGo4pkSrECwVoL+t12Ts8J5AprN6+8jk+EX1xE0Z5Y6YAICO5fNwLeBWzmHi/y9I1zxmBIbBucMuHK3VBsaHKdAd1bQd71Oz98arLaTC54vaNENnNhZcBdkPVMSGuNwpTdGqzDtmAPYwBxEevBu04WyJyyUxS/QaBSOtcPJsPt/nbNpqr9ut5r9H4eFXwQBsxZrFo18ya7JQ8Op6C/mWelXHFZfCBy4QFqAQYJTyQlDR+0WXvEImEGzgq27atjtXeUvAYPFXfFNuViXxsijxct64/t5L3ZWAlfP3RpQfTYapjYG4AX5sqOxuAQkr5ja6ModprRQSP563HHD8fD1OJTtY7Upjt46Um7XFywuHusbW5swZ/MZXFaXoqiYU4wx9Fv6dxKNhTL0VIIw+KJywA9kfvWiBZ6/J8wp/2tADslHMyisNNZbQXv0hrC3K2rqg5xH0taL/ZPaSEiSAQkPDjF+qPg8/dzkQ4NrFjyTX5mb+VtwPCNZyD+FelSM6309aZGuqKgDXUka7JqDkZRmf2xE5LGtFe1i2JF8jtISjUOsqV6ZNqmmFd/L6s8dsRC/Xg9cJ2nke6jbchGm29FCJhLOh+Iqm1UVIw+7wZi3KRAdoC+lRMr7wp22pfOH1FaQ11/mXJR6GQEFUBkLetCZOJ48cyAJMBeFao0F3/NyndvfWCF2Nz6VQWS7s/6+naTd1ge4D/9WL78L5JvkAomui0Dt4NIwOfXkgSqpbbWaNBy/V8GqZY1GNIDcXE+4WQTCB+JRr97psiO4Rh0kfL/qfZUPSuzU/GcQCBJVgWrFdguIwzIypCiMNh1T6QlVLLMKogEcJPmzEBW10gbNb1622mm9ZPZ92vhlgGSvL0j252HvQ218Jrx9qU4G6Jtz2FcN/ezL+0At3cN0kB9ra1YpJv+b+FgZvP1sCGGtThepcb6kyQxIDdSfzStnFzkSF/akEewUJHLtDoPup6iQltei7CL8zYpSTQg4loLtdUXZVthv1/wPg5RfL8vn6QHp7jwvgoO6cocMRfy/zcWI/6Nc/+XSt40N7g2IuBtrJ48MdMu4GxXirbFclTYikAQ3umz6uMlo4ije3858am9t6ItixB1GREXEacluc8bwIJbosgLFSK0tWzgCjy12MhOt2s5uoLqD4ja/CDMw6QGrrD+O8vu6j4T2Nojg9qWuh7350qBrEzJsPVjtxa63ye1hNvArzaHaiLoNRWmoTBWavXN5EQ3aNtJKyyH/nz8wQ4VJQzsDWMQWxdwFmdFXMVk5plw2Lj1PV6Yyhl2VVGp/grCdC5r7KA4HTBfxsagydjaDm08PdnDhuDT/PJ07h9LgdEOM/JXZmuTJp65nb4J612eBa8GefuA4a6tA4KfmLu+hRbz4i4+gTqgPGNFwISSji0/+GIv2G0BUVcYFZvkWzcUVGsX3pNx+FQlNxDdtGN82wSqIAVX0IJgAPd2Mf89ndnJo4GSfPw++U8eNkKevr+AqHRwpIeFxOFYwA1k2dCd1vDqb7XVioi6iGjWYTfSQhPR9X75n+26I2JKCQ8yTqgkgE7H
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 733cbd17-94ab-4c01-4414-08db5239b8a2
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 May 2023 16:06:46.9385 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: Mc6PmKs0vYDGfHwDY3HReVV6VWlanyUaXCd/toIJvk0NI2UZcc3lRUcyA/ME3WKCf75SSGpLnL/guqOTwJHqvQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MM1PPF2F7DF6941
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/jrB-Am25yh2CxW8_nPjeTffawT8>
Subject: Re: [Ace] Review of draft-ietf-ace-coap-est-oscore-00
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 May 2023 16:06:59 -0000

Hi Mališa,

Thanks!

The PR looks good to me, and the comments on the resolution of the open 
points match with my recollection from the discussion at the latest ACE 
interim meeting.

Just one side comment: since this is a WG document, I think it's better 
if its sources and issues are moved to a new Github repo under the IETF 
ACE WG Github organization [1].

Best,
/Marco

[1] https://github.com/ace-wg

On 2023-05-11 16:20, Mališa Vučinić wrote:
> Hi Marco,
>
> Thanks a million for this review. In response, we have created a Pull 
> Request at [1] which integrates the changes to non-controversial 
> points. I respond inline for each point, whether it has been addressed 
> or the planned action to take. My comments are encapsulated within 
> [MV] … [/MV] tags.
>
> Mališa
>
> [1] https://github.com/EricssonResearch/EST-OSCORE/pull/8 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=REZA%2FXKbyI3%2B1XXkDJ%2Fgwf94A%2BuyW2skVUoIoF4yv%2BQ%3D&reserved=0>
>
>> On Apr 29, 2023, at 12:04, Marco Tiloca 
>> <marco.tiloca=40ri.se@dmarc.ietf.org> wrote:
>>
>> Hello ACE,
>>
>> Please see below some comments on this document.
>>
>> Best,
>> /Marco
>>
>>
>> [General]
>>
>> * Replace RFC 7049 with RFC 8949
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/1947e005ca371cae08e80cf565ee18fba6809e4f 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F1947e005ca371cae08e80cf565ee18fba6809e4f&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=BScvV%2FqWNvxiP%2FfyxXTHgYJQdKaDJmZ0jNw%2Fu9TpCE8%3D&reserved=0> [/MV]
>
>> * Replace RFC 8152 with RFC 9052 and RFC 9053
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/519217505b23a6732ec33e85a9c789274fbcb006 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F519217505b23a6732ec33e85a9c789274fbcb006&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tNThWvEi9qgC%2F5emAPefk0DhBQJVstHTxzsG5CvUX%2BI%3D&reserved=0> [/MV]
>
>> * When mentioning DTLS and referring to RFC 6347, refer also to RFC 9147
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/7789963a069e2be7311274e71f6653123ff87102 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F7789963a069e2be7311274e71f6653123ff87102&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=IVDppZkFFqvtJN930L1rDfLToF9K%2BNBzNt%2FMfUO0bG8%3D&reserved=0> [/MV]
>>
>> * As expected, the draft focuses on the EDHOC forward message flow, 
>> as it better maps against the EST expected workflow and ensures to 
>> protect the identity of the EST client. That said, can the use of the 
>> EDHOC reverse message flow be explicitly ruled out altogether?
>
> [MV] As discussed in the meeting, the proposed action here is to add 
> an explicit statement in Section 3 (Authentication) that the EST 
> client MUST play the role of the EDHOC initiator. [/MV]
>
>
>> [Section 1]
>>
>> * s/secured HTTP/HTTP [RFC9110][RFC9112] and TLS [RFC8446]
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/a753faf2c9d44e8289cb186c68cc1a5879db3806 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fa753faf2c9d44e8289cb186c68cc1a5879db3806&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=MnKzbjOMgFjGkn2XgQMPwRsvktUJPaDYJWDCj8oTpEQ%3D&reserved=0> [/MV]
>
>> * s/which protects the application layer message/which protects 
>> messages at the application layer
>>
>> * s/multicast CoAP messages/CoAP group messages
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/5e021fd279c408a15f528de1244b084ff0506efe 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F5e021fd279c408a15f528de1244b084ff0506efe&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Y3jwXJOc4Z7s8sccUCGLSFOJq9J1fe4kUECCxW3I%2Bdg%3D&reserved=0> [/MV]
>>
>>
>> [Section 1.1]
>>
>> * "The concept "Registrar" and its required trust relation with EST 
>> server as described in Section 5 of [RFC9148] is therefore redundant."
>>
>>    Do you really mean "redundant"? Isn't it actually "inapplicable"?
>
>
> [MV] Replaced “redundant” with “not applicable” in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/844d764ad07f1610fdd1b3b3518185e442be0c96 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F844d764ad07f1610fdd1b3b3518185e442be0c96&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cMvbk3Sz%2FRKmdcf2ST%2BMuASrQLUCt8dnLzdk8RCfsFs%3D&reserved=0> [/MV]
>
>
>>    In the presence of end-to-end security through OSCORE between the 
>> EST client and server, an hypothetical Registrar cannot perform its 
>> task as it does instead in RFC 9148. In this case instead, an 
>> intermediary would be simply limited to be a (cross-)proxy, on which 
>> indeed less trust needs to be put.
>
> [MV]
>
> Agreed: I believe that your statement is covered by the precedeing 
> sentence in the section on “Operational Differences with EST-coaps”, 
> which states:
>
> "The EST payloads protected by OSCORE can be proxied between 
> constrained networks supporting CoAP/CoAPs and non-constrained 
> networks supporting HTTP/HTTPs with a CoAP-HTTP proxy protection 
> without any security processing in the proxy (see {{proxying}}). "
>
> [/MV]
>
>> [Section 3.0]
>>
>> * "This specification replaces the DTLS handshake in EST-coaps with 
>> the lightweight authenticated key exchange protocol EDHOC 
>> [I-D.ietf-lake-edhoc]."
>>
>>    However, Section 1 talks about possible co-existence of OSCORE and 
>> DTLS, rather than of replacement. I think you mean "replaces or 
>> complements", like said in the previous sections.
>>
>> * "... and establish the OSCORE security context with which the EST 
>> payloads are protected."
>>
>>    This should be "... Security Context used to protect the messages 
>> conveying the EST payloads."
>>
>> * I suggest to split the second paragraph into two parts.
>>
>>   The first part ends with the current "The server MUST authenticate 
>> the client". The text can highlight that all those requirements are 
>> fulfilled when specifically using EDHOC.
>>
>>   The second part would say "The server MUST also provide relevant 
>> information to the CA for decision about issuing a certificate".
>
>
> [MV] The comments above are addressed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/49551af2d3142b5fb139852760548e8a4eb96d77 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F49551af2d3142b5fb139852760548e8a4eb96d77&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=C5FtQu%2Fl%2F1VfvwfpHtwAztPqOEshWrHp5%2FaABymZV80%3D&reserved=0> [/MV]
>
>> [Section 3.1]
>>
>> * "or a pointer such as a URI to the credential (e.g., x5t, see 
>> [I-D.ietf-cose-x509])"
>>
>>    This is mixing a type of credential reference with the abbreviated 
>> name of a different reference type. Either say a hash and then the 
>> parameter x5t, or a URI and then the parameter x5u.
>
> [MV] We fixed this by replacing the example notion of x5t with x5u in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e4033cc7d644f38ced164bf4b58a08a1e7a6dc8e 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe4033cc7d644f38ced164bf4b58a08a1e7a6dc8e&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=g3qtWxUbKBY6SVSlLJs0U%2F96SK9Nny%2BxcXLlv%2Fb3jks%3D&reserved=0> [/MV]
>
>
>> [Section 3.3]
>>
>> * Section 1 says: "pre-shared OSCORE keying material would also be an 
>> option."
>>
>>    In such a case, is channel binding simply not achievable?
>>
>>    Or is it somehow possible as long as the OSCORE keying material 
>> was established through some sort of interactive protocol (e.g., like 
>> the OSCORE profile of ACE, see RFC 9203)?
>
>
> [MV] As discussed in the meeting, the proposed action here is to 
> explicitly specify that EDHOC-Exporter-based channel binding is 
> applicable only to cases where EDHOC is executed prior to enrollment 
> and to state that the channel binding is not supported when pre-shared 
> OSCORE context is used. [/MV]
>
>>
>> * "length equals the desired length of the edhoc-unique byte string"
>>
>>    I think it's better to specify a length of the byte string to use, 
>> unless otherwise indicated/advertised (e.g., in a used EDHOC 
>> application profile). RFC 9148 considers 32 bytes (see its Section 3).
>
> [MV] Yes, agreed. Similar to RFC 9148, we now specify the length of 32 
> bytes for edhoc-unique value. This is committed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/4fe0527f0ace8c3bd491fbac895164e225ee72a3 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F4fe0527f0ace8c3bd491fbac895164e225ee72a3&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=OLKIyx1%2ByWUJpxlBtEUhd9F%2B7Zd4qDtxI2E%2B6aveYfA%3D&reserved=0>
> [/MV]
>
>
>> [Section 3.4]
>>
>> * In scenarios using message_4, wouldn't it make sense to have the 
>> PKCS#10 request and response transported in an EAD_3 and EAD_4 item, 
>> respectively?
>
> [MV] As discussed in the meeting, the reason for not transporting PKCS 
> objects within EAD fields of EDHOC is that we also consider 
> re-enrollment where EDHOC is not necessarily executed. Therefore, 
> proposed action is to informatively mention that not using EAD is 
> intentional. [/MV]
>
>
>> * s/The certificate MAY be referenced/The client certificate MAY be 
>> referenced
>>
>> * s/response to the PKCS#10 request MAY be/response to the PKCS#10 
>> request MAY specify
>>
>>
>> [Section 4.0]
>>
>> * "OSCORE [RFC8613] is used to protect the EST payloads."
>>
>>    This should be "OSCORE [RFC8613] is used to protect the messages 
>> conveying the EST payloads."
>>
>> * s/DTLS handshake is replaced with EDHOC/The DTLS handshake is 
>> complemented by or replaced with EDHOC
>>
>>    Then the following sentence can clarify that the architecture 
>> shown in Figure 6 does not consider the additional use of DTLS.
>
>
> [MV] The comments above were addressed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/69aadd5515277f82256e6ee1059018fb2c1ecc65 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F69aadd5515277f82256e6ee1059018fb2c1ecc65&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2FRfmkq1ALOShvOtBbr0%2BgTZxqIlQ%2FgcU28QVC4rYrjM%3D&reserved=0> [/MV]
>
>> [Section 4.1]
>>
>> * In the shown example, the resource type should be rt="ace.est.sen" 
>> also in the link specified in the response.
>
> [MV] This is fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e03c708c36e92a70ecd322b3fe5b04d8e4014096 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe03c708c36e92a70ecd322b3fe5b04d8e4014096&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=6ghbrJr1dZf21DupGGACe9g%2FhfQNicxr03pg3HuBtvQ%3D&reserved=0> [/MV]
>
>
>> * Per Section 9 of RFC 8613, the "osc" attribute is optionally 
>> included in a link to specify that a resource has to be accessed with 
>> OSCORE. Should it remain optional here too?
>>
>>    Consider a setup where OSCORE and DTLS are combined. Especially 
>> when discovering EST resources on a non-default port number, the 
>> links to those resources would have URI scheme "coaps". Then, the 
>> absence of the "osc" attribute might wrongly suggest that the EST 
>> server is actually using EST-coaps.
>>
>>    Therefore, it might be worth mandating the use of the attribute 
>> "osc" in links to EST resources accessed as in this specification.
>>
>>    An alternative would be defining a new set of EST-OSCORE-related 
>> Resource Type values, such as "ace.est.osc.*".
>
> [MV] As discussed in the meeting, the proposed action here is to 
> mandate the use of the attribute “osc” in links to EST resources. [/MV]
>
>> [Section 4.2]
>>
>> * Regarding the response from /skc, is it possible to deviate from 
>> what is defined in RFC 9148 and *not* encrypt the private key? After 
>> all, end-to-end encryption of the whole EST payload is ensured by OSCORE.
>>
>>    If yes, that might open for a new Content-Format pair (284, 287), 
>> i.e., an unencrypted PKCS #8 private key together with a single 
>> certificate (not a PKCS #7 container).
>
> [MV] As agreed in the meeting, we will specify that the response /skc 
> can be PKCS #8 private key because OSCORE is used, and also specify 
> the new Context-Format pair. [/MV]
>
>> [Section 4.3]
>>
>> * "EST-oscore uses the same CoAP Content-Format Options to transport 
>> EST requests and responses"
>>
>>    I think you mean: "EST-oscore uses the same CoAP Content-Format 
>> identifiers when transferring EST requests and responses".
>>
>> * The caption of Table 2 should be: "EST functions and the associated 
>> CoAP Content-Format identifiers"
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/78f07ac2885e2b865647377924cd3566a789181c 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F78f07ac2885e2b865647377924cd3566a789181c&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=01C5V5%2FedOK2QxlZ%2BOMD%2BY6iE5nuU6fRj4%2B4EO9n40U%3D&reserved=0> [/MV]
>
>>
>> * I suppose your intention is for the EST client and server to 
>> support Content-Formats just like in RFC 9148, i.e.:
>>
>>    "Content-Format 281 MUST be supported by EST-coaps servers. 
>> Servers MAY also support Content-Format 287. It is up to the client 
>> to support only Content-Format 281, 287 or both."
>>
>>    I think it is good to have an explicit statement here too.
>>
>> * Like RFC 9148 does in its Table 3, it is good to also recap the 
>> Content-Format identifiers used for the different parts of the 
>> responses from /skg and /skc.
>
> [MV] As agreed in the meeting, we will specify explicitly 
> Content-Format support and add a Table similar to RFC 9148 Table 3. [/MV]
>
>
>> [Section 4.4]
>>
>> * The list of requirements is preceded by "It is RECOMMENDED that". 
>> However, isn't it a MUST for (at least) the CoAP options OSCORE and 
>> Uri-Path?
>
> [MV]
> As discussed in the meeting, the action here is to avoid the use of 
> normative keywords and rephrase to informatively discuss what is 
> expected to be supported. This is now done in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/455ef9f7399619eaa9abfbb35f97864e69b88e72 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F455ef9f7399619eaa9abfbb35f97864e69b88e72&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qj7xV3MFVBwELVwpXin2gONGh2aXIfY5TpKKxjoXqjc%3D&reserved=0>
>
> [/MV]
>
>> * "The EST URLs based on https:// are translated to coap://, but with 
>> mandatory use of the CoAP OSCORE option."
>>
>>    The scheme "coap" is the translation target only if DTLS is not 
>> additionally used.
>
> [MV] As agreed in the meeting, we will explicitly mention that if DTLS 
> is used, scheme is “coaps”. [/MV]
>
>> [Section 4.6]
>>
>> * "such as CBOR-encoded payloads ([I-D.ietf-cose-cbor-encoded-cert])"
>>
>>    Perhaps you meant to refer to RFC 8949?
>>
>> * s/reconstitution/reassembly
>
> [MV] Comments above fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e83c809ce105b50e6f7be1a1b13def7ceb9840e2 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe83c809ce105b50e6f7be1a1b13def7ceb9840e2&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=LH2QNk4oMj%2FEysLeL5kfsRJ0v3WwPYV31XJvH2x%2Fe8A%3D&reserved=0> [/MV]
>>
>> * "this specification mandates the implementation of CoAP option 
>> Block1 and Block2 fragmentation mechanism [RFC7959]"
>>
>>    This is good, but it contradicts the text in Section 4.4 where the 
>> support of the CoAP option Block1 and Block2 is only RECOMMENDED.
>
> [MV] As discussed in the meeting, we will replace this text with 
> requirements similar to Section 4.6 of RFC 9148 on Block1 and Block2. 
> [/MV]
>
>> [Section 4.8]
>>
>> * "The EST client prepares the PKCS #10 object and signs it by 
>> following the steps in Section 4 of [RFC6955]."
>>
>>    Even though Section 4 of RFC 6955 does use the words "The value to 
>> be signed", it is quite confusing to read "signs it" in this section, 
>> which correctly starts with saying that a Diffie-Hellman key pair 
>> cannot be used for signing operations.
>>
>>    I think that here it is worth saying "and computing a MAC" instead 
>> of "and signs it".
>
> [MV] Fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e83c809ce105b50e6f7be1a1b13def7ceb9840e2 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe83c809ce105b50e6f7be1a1b13def7ceb9840e2&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=LH2QNk4oMj%2FEysLeL5kfsRJ0v3WwPYV31XJvH2x%2Fe8A%3D&reserved=0> [/MV]
>
>>
>>
>> [Section 5]
>>
>> * "the EST payloads can be protected end-to-end"
>>
>>    This should be "the messages conveying the EST payloads can be 
>> protected end-to-end"
>>
>> * "Therefore the concept "Registrar" and its required trust relation 
>> with EST server as described in Section 5 of [RFC9148] is redundant."
>>
>>    See a previous comment about Section 1.1, on the word "redundant".
>>
>> * "The use of TLS and DTLS is optional."
>>
>>    Proposed rephrasing: "The additional use of TLS or DTLS is optional."
>
> [MV] Comments above are fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/63d491225c85f5582e31d3de3df0ba4b865eb724 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F63d491225c85f5582e31d3de3df0ba4b865eb724&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Ks66zzVgjskpREBJ6KvAEFgGt5zpSfqDf85qXwczADY%3D&reserved=0> [/MV]
>>
>> * If a secure association is needed between the EST Client and the 
>> CoAP-to-HTTP Proxy, this may alternatively and more conveniently rely 
>> on OSCORE as well, see 
>> https://datatracker.ietf.org/doc/draft-tiloca-core-oscore-capable-proxies/
>
> [MV] As discussed in the meeting, the proposed action here is to 
> informatively reference draft-tiloca-core-oscore-capable-proxies as a 
> way to establish a secure association between the EST client and 
> CoAP-to-HTTP proxy. [/MV]
>
>>
>> [Nits]
>>
>> * Section 1
>> --- s/of underlying transport/of the underlying transport
>> --- s/needs to be kept/need to be kept
>> --- s/between EST-oscore client/between the EST-oscore client
>>
>> * Section 1.1
>> --- s/replaced, or complemented, with OSCORE/replaced by, or 
>> complemented with, OSCORE
>> --- s/replaced, or complemented, with the lightweight/replaced by, or 
>> complemented with, the lightweight
>> --- s/relation with EST/relation with the EST
>>
>> * Section 3
>> --- s/initial enrollment the EST-oscore/initial enrollment, the 
>> EST-oscore
>> --- s/EST-oscore clients and/The EST-oscore clients and
>>
>> * Section 3.2
>> --- s/between EST client and/between the EST client and
>>
>> * Section 3.4
>> --- s/e.g. using/e.g., using
>>
>> * Section 4
>> --- s/Instead of DTLS record/Instead of the DTLS record
>>
>> * Section 4.2.1
>> --- s/e.g. using/e.g., using
>>
>> * Section 4.6
>> --- s/depending on application/depending on the application
>> --- s/than available frame size resulting/than the available frame 
>> size thus resulting
>> --- s/implementation of CoAP option/implementation of the CoAP option
>> --- s/fragmentation mechanism/to enforce the fragmentation mechanism 
>> defined in
>>
>> * Section 5
>> --- s/between EST client and EST server independent/between the EST 
>> client and EST server, irrespective
>
> [MV] Nits above were fixed in 
> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/8337d01576f42e8ac17f267283690e550a347aeb 
> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F8337d01576f42e8ac17f267283690e550a347aeb&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=o8YwblZZFeYjbprKvVQzmbLJN8MSK%2F3TGzLOmwqS5yg%3D&reserved=0> [/MV]
>
>
>> -- 
>> Marco Tiloca
>> Ph.D., Senior Researcher
>>
>> Phone: +46 (0)70 60 46 501
>>
>> RISE Research Institutes of Sweden AB
>> Box 1263
>> 164 29 Kista (Sweden)
>>
>> Division: Digital Systems
>> Department: Computer Science
>> Unit: Cybersecurity
>>
>> https://www.ri.se
>> <OpenPGP_0xEE2664B40E58DA43.asc>_______________________________________________
>> Ace mailing list
>> Ace@ietf.org
>> https://www.ietf.org/mailman/listinfo/ace
>
>
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace

-- 
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se