Re: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14

Francesca Palombini <francesca.palombini@ericsson.com> Fri, 05 March 2021 16:03 UTC

Return-Path: <francesca.palombini@ericsson.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3DFA63A2747; Fri, 5 Mar 2021 08:03:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.348
X-Spam-Level:
X-Spam-Status: No, score=-2.348 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.248, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jCQasJ-AeD0p; Fri, 5 Mar 2021 08:03:30 -0800 (PST)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20083.outbound.protection.outlook.com [40.107.2.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0A08E3A2744; Fri, 5 Mar 2021 08:03:29 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FehCx4fFPB6A1ltbs6KZhDi/OVZEs0CwkPZjDikMYc6bnt/Ex5NdZsVgosqQfhkuU0KGZ+N19qSsZkah7LxB626W6yjlNtzeN//rfya7JCudLTCcuyOu08M/f3iLTBJLy9EFZ4E9Kc6XNktK/sZVSjLJ0KJ/AsOLIw4OyxnVZ7eNSRfqsNfbLNonJgbLrGd/zHIXlUnG4CuF40cFMwLEUHnEFg6oO7gsOe6EQlDVkGn59iWKlBb2Vi2CR+2XnPRoYSjCtLXn3lgl1EfnAFfsw3+qdy/u/hNC7Fwjtk0QfEKWQ4eZb6NfanVjZBlT5+mTjyaeGN5jCqoYILX7/o9H8g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rVT41dqFr07T0GDqHdLwlCJ8/eD5ecgwbfw+zOjZrOw=; b=gG/F06PiJYNycb8hutKVgaZ+Y7cLMawvlPdtLVgOtufoMfAhz3K4ptIGKJ9rF2EDi6QUnTpBbz0rG51GhGsp/wvgnGR7OP8fBVWAsLxuezSGX/dqHmxch4izOB3XDEaXapsEeJCFsKH3jrXmq6BSlpEb1z7ri4umCUz9KmPcMlJdiPw2miuT7FD/nfSzeUdZHTQ8RI0lma93Fwnun4QOQjrB7oeZcWA0OFJvHRpDEIGxBz5MPgX5627Rv0/dKxSZKYFIkaLaLqJnEzdCi5q3t1IJ3+IfM232zdM+0RJrvPK/U03pQGmKCX+BcxJ27eU+Lp3z9J0G5lSflvjFtaLCkw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rVT41dqFr07T0GDqHdLwlCJ8/eD5ecgwbfw+zOjZrOw=; b=TdA5TX4fgo+WqRkaUKTWlgJghazb3IuXFNS7DTNAOp+IVBr6gJag07TsuVhqOxzr8Spii3W9QvEgz39Le+gQT4INAz4Cnc6C0+Q7Ahhgg1OayMO36+A38ddZjsrk2TJKs1BN+tEeQ35OJeCBvFGqlOPy+/XWZTgS3uN4BFCagg0=
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com (2603:10a6:7:96::33) by HE1PR0701MB2794.eurprd07.prod.outlook.com (2603:10a6:3:9a::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.12; Fri, 5 Mar 2021 16:03:26 +0000
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::75e7:cd0e:a0b6:eb1e]) by HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::75e7:cd0e:a0b6:eb1e%3]) with mapi id 15.20.3868.038; Fri, 5 Mar 2021 16:03:26 +0000
From: Francesca Palombini <francesca.palombini@ericsson.com>
To: Daniel Migault <mglt.ietf@gmail.com>, =?utf-8?B?R8O2cmFuIFNlbGFuZGVy?= <goran.selander@ericsson.com>
CC: Stefanie Gerdes <gerdes@tzi.de>, Olaf Bergmann <bergmann@tzi.org>, Russ Mundy <mundy@tislabs.com>, "draft-ietf-ace-oauth-authz@ietf.org" <draft-ietf-ace-oauth-authz@ietf.org>, Loganaden Velvindron <loganaden@gmail.com>, Ace Wg <ace@ietf.org>
Thread-Topic: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14
Thread-Index: AQHXBHapy0F5B7oGiUeoQX7fri0qP6pa7vCAgAFwIICAAChkgIAB24wAgAAXrwCABX2oAIAAVZsAgAyJWQCAAA8KQIAA1qoAgAJGS4CAABYqAIAACiIAgAGWZYA=
Date: Fri, 5 Mar 2021 16:03:26 +0000
Message-ID: <0C8BC190-95F3-4A88-B683-09E22EBD54AB@ericsson.com>
References: <871rdqihww.fsf@wangari> <FD569111-85F8-40A2-8C97-764977309B87@ericsson.com> <CADZyTk=HB26o=mUpUdbYEhfhrGZar+oe28c5PZ2_j-vKYVA6xg@mail.gmail.com> <c6d42d18-f1f3-ec00-fff9-3540fa222d23@tzi.de> <9911269D-AA7F-458C-AA1A-2D59A79C5A00@ericsson.com> <CADZyTkn=3GigtTiihQX0ORYyO0dV0qCfVMtTn37vbsqJuQUJxw@mail.gmail.com> <026242c2-2c6a-485b-cb51-34b2b2d70975@tzi.de> <DM6PR15MB23796DF01885DC7F86C15583E3879@DM6PR15MB2379.namprd15.prod.outlook.com> <6b5368a6-b8ba-81eb-0c10-6a052fcbad67@tzi.de> <DM6PR15MB23798EE51BDED9BB7D0438E3E3869@DM6PR15MB2379.namprd15.prod.outlook.com> <2C5A1AA5-6124-407B-A342-AA367CB6D536@tislabs.com> <DM6PR15MB23799382A92C9B2074B1BF42E3859@DM6PR15MB2379.namprd15.prod.outlook.com> <F6B1D3C5-DE79-42B4-8CEA-620C86EABF4B@ericsson.com> <CADZyTk=y7Zf3Atvt7d5c17KEbnc5CESoOyBsa0TgpMchX4FcPQ@mail.gmail.com> <CADZyTk=gc8ybr5+wQhN0P_Vyz2P+g6TtwWcAGYGbofeMeq0cjQ@mail.gmail.com> <87v9a94m60.fsf@wangari> <CADZyTkkf3qj=ZXvH1QYe1Kg=wUxMug2y6e=9-b31mkUAeC4Qrw@mail.gmail.com> <CADZyTknPLSvfixtM1JTXnKia6ooSwWssV-zAhWi-fPoBrwMBdA@mail.gmail.com> <1932F1CD-7296-4266-B234-1FD30A019522@ericsson.com> <CADZyTknSmX8tqhce7bfUvtm7S11GPru5Swuxx7fLkUTr-yaPqg@mail.gmail.com>
In-Reply-To: <CADZyTknSmX8tqhce7bfUvtm7S11GPru5Swuxx7fLkUTr-yaPqg@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.46.21021202
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [2001:1ba8:147a:c100:11e9:199a:1b0e:a8bf]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2bdb517e-6240-4c9a-6aad-08d8dff03613
x-ms-traffictypediagnostic: HE1PR0701MB2794:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <HE1PR0701MB2794C8F5B5C0C28A65BB0AAB98969@HE1PR0701MB2794.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR07MB4217.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(136003)(366004)(376002)(346002)(396003)(4326008)(86362001)(6636002)(5660300002)(44832011)(186003)(6506007)(53546011)(71200400001)(8936002)(2616005)(316002)(33656002)(66574015)(36756003)(110136005)(66476007)(478600001)(64756008)(66446008)(76116006)(6512007)(66946007)(54906003)(66556008)(8676002)(6486002)(9326002)(83380400001)(2906002)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: =?utf-8?B?eFZBaGVMR3EzM0ZvUlZzK2lxVUh1cGtlNEdWZnMzelNsRXkvYmdtRXpZSkpW?= =?utf-8?B?SGZmdyt0N0x2USt2OU5Ka1NBNkZFWVR6a2hCbzJQalZiaitwRjhEZHRES0N5?= =?utf-8?B?d0NDeUhDQmowenRLQUNFYUVNSWs2Yk5VMnJ5NSsxdk9sNDZ4WDJtcnVkVVlC?= =?utf-8?B?R0U3YmhML203RlRYSllaNFZ4bk4yUmpuajIveVBYcTlycTBSaWhaUUhmaGtJ?= =?utf-8?B?cWcydFAyUDluelhmSnBmWWlLVmU4dWExS1gySFRaWmNkWWZjR3Yvdml0Uk15?= =?utf-8?B?dHJRZStiVkk4TEJwOTB6dHllZ05vZEpCWGhMTEtDTTYxdGdweVNKYjhjMFBF?= =?utf-8?B?UCt4RjVMUDJWbFhPQ3ZtRjVUZUNNSEE5ZE9mWnNhVytkNTJodXF5NHN2c205?= =?utf-8?B?MEtTbG9EYVY2bm5STXJEeTYvTjh1OGNZUjBoWENWcXRHQklOSkZBS3M2TmNR?= =?utf-8?B?N0hqTXZPbmR5OStlMWNKR1lhQlhUZ251OHkyQlAvYWd3bW5yNmhOTFZTanZy?= =?utf-8?B?STZCZDUxeUNxTURTNjJGTHl6Z0FnaHVxU2NJbFVrZ3d2azZUQlBXZlFkUzFT?= =?utf-8?B?ZnhMMW1Jd254WnJ0OGtiSjJyNmp6Z1B1TjZKRVI4cHN1aXFXcnZYUjM3YjJo?= =?utf-8?B?eXl6dW5UaXpReW5ocFVIRTQwWlBtUDVmT1dDd040L0UySEE4dmZLOWJrUHlU?= =?utf-8?B?ZDdNSmg4R0ZMYURWVS80RTVXV3dNUWVrbFVsamFXQkhjMGcvTGdqSWJlWlQy?= =?utf-8?B?ZUxLZkdzSENVTnduTkVRUFBMVEsyOGtDVnppeEx4d0ZMZWVpUzVkd0ozMVdD?= =?utf-8?B?VXJYUjdHaVNEMkpleFh5VG9Ua2VGQkZENDgwRVQ4Qk9aS1RMTlhsK3RublAw?= =?utf-8?B?ajNEMmFDOGIrcVY3bXhZSEp4SytjVzhBM1krS1pwSnY5QzdiSGlHQmhKMXp4?= =?utf-8?B?eWhjN0UzbFQwb25DVnh5ZjJmSDA2ZHRZVnFUSGk5UFNSOVIwVW1rTTdFeGFL?= =?utf-8?B?c2hLN2p6cHhpVXVwM3p5OWtiNkFEOTdFdUx5RnVTOXF5M2VnRjR0Qi9YY0x0?= =?utf-8?B?T3RZU0JzL2V0QnIxbERaemwrZDl0cHBpQWJjbVhpRGIrM3lpWEJlS3p0Q2ky?= =?utf-8?B?V1pHcC9lVXFNeU0ydk1TTWJkcW9xbnFpUEY3RXkzWEsvS3dBSzZWNmtPb3k3?= =?utf-8?B?MGUxLzIwVmxnc002Y0FJak9UMTVNRk9wR3lBdUhlUERid1M5UmR5ZEFvSmVE?= =?utf-8?B?MzhnWFM4QSsxQ2N1T2RaRFVFVWxOejl5dldEd2hpaURzWVduZzdwYXNUTnZR?= =?utf-8?B?NzJLOFdQS1ZmaVpzODlpRUowZFRibWhXZmpnMGdwNXo4bjE4Z3IxRzdTRkRV?= =?utf-8?B?UzUwM2N6NjJFK0Vqcm5RcVhlUDJmVDlUc3NhVkFRNEtQMWRlOWhCVVpSR0RE?= =?utf-8?B?VkRvWW9GeFlWNXhyclhVZ1FlUGl6S1Fka1FRWGFjUkJ5S0U4TnJJS0JDMnAz?= =?utf-8?B?ckFiV2VKUGUxR0VHb0t0aEtPSTJoSVNlcDlkTWV0ZmdiWUppME5ZVzZ3OVJq?= =?utf-8?B?RzQ3REVtbm94VG9UaEszK0svM0VxcTgxbHY3ZENINWF6U2xPVnJmL2RuSVFz?= =?utf-8?B?cVFtOXlGWE5yWkxJdnF2TEVCQ2VuTzBtWlF6Y2IvS2hVenF2QTI5NEtZdGtx?= =?utf-8?B?bFZBM1ZOQWdSZktmMExvWExjZTc0NVhBc2xPZFRKeEhkY0hPSlZjVERjNmRJ?= =?utf-8?B?Mmt4djVlc051Q1M1SWI4Q2tHaWd6OC8xMjkzWjhQR25UNDRyUXBBL01PS0ZG?= =?utf-8?B?MDNONEplWGdaOFRNZWVoZ3pWZGRvTjdENGFKWmhmZmRhaXRmM29VT0lTR3E2?= =?utf-8?B?eUVkSmt6eVU1eTIzYU9SNVl5SVUrVzk5SzdzcXJNV09MTXc9PQ==?=
Content-Type: multipart/alternative; boundary="_000_0C8BC19095F34A88B68309E22EBD54ABericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR07MB4217.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2bdb517e-6240-4c9a-6aad-08d8dff03613
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Mar 2021 16:03:26.4472 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: J1EUv81YT0eQh4qKdm5wJs03lwsVLiNIvUQ0KbTxrDCRg9cybdX2FwXSYjCjxw385i3Z5axwz8QufjV7OiM0Py/kNx0IgkJWmHhPVDDE7VdbYTFAoBEwrVYalNc0QnSJ
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2794
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/vFVVqdZGx19KYQBAHrlMkZF5JK4>
Subject: Re: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 05 Mar 2021 16:03:33 -0000

Hi,

(Adding back the ace ml that was dropped at some point)

Here is a proposal for the paragraph in Section 5 with a different last sentence to hopefully clarify the need for recommendations but not mandate only one sec protocol per profile:

Section 5:
OLD
    "Profiles MUST specify a communication security protocol that provides the features required above."

  NEW
    "Profiles MUST specify a communication security protocol between client and RS that provides the features required above. Profiles MUST  specify a communication security protocol RECOMMENDED to be used between client and AS that provides the features required above. Profiles MUST  specify for introspection a communication security protocol RECOMMENDED to be used between RS and AS that provides the features required above. These recommendations enable interoperability between different implementations, without the need to define a new profile if the communication between C/RS and AS is protected with a different security protocol complying with the security requirements above."


The proposal for the other section looks good to me.
Francesca

From: Daniel Migault <mglt.ietf@gmail.com>
Date: Thursday, 4 March 2021 at 17:49
To: Göran Selander <goran.selander@ericsson.com>
Cc: Stefanie Gerdes <gerdes@tzi.de>de>, Olaf Bergmann <bergmann@tzi.org>rg>, Francesca Palombini <francesca.palombini@ericsson.com>om>, Russ Mundy <mundy@tislabs.com>om>, "draft-ietf-ace-oauth-authz@ietf.org" <draft-ietf-ace-oauth-authz@ietf.org>rg>, Loganaden Velvindron <loganaden@gmail.com>
Subject: Re: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14

HI Goran,

sure any wordsmithing / alternative are fine to me. For the second alternative the repetition of "with" may sound to me a bit strange.

Unless anyone objects that would be greatly appreciate to have a new version submitted. Thanks!

Yours,
Daniel



On Thu, Mar 4, 2021 at 11:12 AM Göran Selander <goran.selander@ericsson.com<mailto:goran.selander@ericsson.com>> wrote:
Hi Daniel,

The proposal coincides with the text I proposed Feb 22 except for one sentence:

"Such recommendations are expected, among others, to guarantee independent implementations interoperate."

This sentence does not read well to me, perhaps we can change it? For example:

"These recommendations are expected to enable interoperability between independent implementations."

 . . . or even add the reason why it is only a recommendation:

"These recommendations are expected to enable interoperability between independent implementations, without preventing this profile to be used with other security protocols with the AS complying with the security requirements."

I can make the changes and submit a new version of draft-ietf-ace-oauth-authz in the beginning of next week when ID submission has reopened.

Regards
Göran



On 2021-03-04, 15:54, "Daniel Migault" <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>> wrote:


    Hi all,
    I know everyone is very busy by now, but I am wondering if you could provide your input so that we can think of closing this issue before the IETF 110 - or at least as soon as possible. Our initial milestones were to send these doc in February ;-)

    Yours,
    Logan and Daniel
    ---------- Forwarded message ---------
    From: Daniel Migault <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>>
    Date: Tue, Mar 2, 2021 at 11:09 PM
    Subject: Re: [Ace] secdir review of draft-ietf-ace-dtls-authorize-14
    To: Olaf Bergmann <bergmann@tzi.org<mailto:bergmann@tzi.org>>
    Cc: Göran Selander <goran.selander@ericsson.com<mailto:goran.selander@ericsson.com>>, Olaf Bergmann <bergmann@tzi.org<mailto:bergmann@tzi.org>>, Russ Mundy <mundy@tislabs.com<mailto:mundy@tislabs.com>>, ace@ietf.org<mailto:ace@ietf.org> <ace@ietf.org<mailto:ace@ietf.org>>, Stefanie Gerdes <gerdes@tzi.de<mailto:gerdes@tzi.de>>, Francesca Palombini <francesca.palombini@ericsson.com<mailto:francesca.palombini@ericsson.com>>, Daniel Migault <daniel.migault=40ericsson.com@dmarc.ietf.org<mailto:40ericsson.com@dmarc.ietf.org>>



    Thanks for the feedbacks Olaf. So I understand why we need such flexibility on the client side. The main reason seems that the communication with the AS is seen as bootstrapping the communication between the client and the RS and as such we would like to keep them as independent as possible.
    I see interoperability being achieved when a) client, RS, and AS implemented by independent vendors and b) all three follow the framework and the given profile is sufficient to make them work together. Currently the client - RS communication is well defined, but the client AS communication is left to a RECOMMENDATION.

    RFC2119 defines RECOMMEND as follows:
    SHOULD   This word, or the adjective "RECOMMENDED", mean that there
       may exist valid reasons in particular circumstances to ignore a
       particular item, but the full implications must be understood and
       carefully weighed before choosing a different course.
    The question becomes how RECOMMENDED is sufficient or not.




    It seems to me the definition above makes it clear that the recommended protocol is expected to be supported, and AS or clients that are independently developed are expected to support the recommended protocol. To ensure the implementers are well aware of the consequences of the implication we could clarify this explicitly. Of course this does not provide a formal proof for interoperability, but this seems acceptable in the scope of a framework.

    From the latest suggestion, I would propose the following changes, - that I expect will reach consensus. Please let us know by Friday  March 5 if you agree or disagree with the proposed changes.


     Section 5:
    OLD
    "Profiles MUST specify a communication security protocol that provides the features required above."

    NEW
    "Profiles MUST specify a communication security protocol between client and RS that provides the features required above. Profiles MUST  specify a communication security protocol RECOMMENDED to be used between client and AS that provides the features required above. Profiles MUST  specify for introspection a communication security protocol RECOMMENDED to be used between RS and AS that provides the features required above. Such recommendations are expected, among others, to guarantee independent implementations interoperate."

    Section 6.2:
    OLD
      "Profiles MUST specify how communication security according
       to the requirements in Section 5 is provided."
    NEW
    "The requirements for communication security of profiles are specified
    in Section 5."


    Yours,
    Daniel






    On Tue, Mar 2, 2021 at 10:20 AM Olaf Bergmann <bergmann@tzi.org<mailto:bergmann@tzi.org>> wrote:


    Hi Daniel,

    On 2021-03-02, Daniel Migault <mglt.ietf@gmail.com<mailto:mglt.ietf@gmail.com>> wrote:

    > This is just a follow-up. I would like to be able to close this issue
    > by the end of the week, and so far I have not heard any issues for
    > profile mandating a protocol. On the other hand, not mandating a
    > specific protocol comes with interoperability issues. So unless more
    > feed back is provided, I am currently leaning toward ensuring
    > interoperability.
    >
    > It  would be good for me to hear from the WG and understand what concrete deployment
    > issues the two statements below would raise:
    >     * OSCORE profile mandating the AS to support OSCORE and have the C <-> AS using
    > OSCORE.
    >     * DTLS profile mandating the AS to support DTLS and have the C <-> AS using DTLS.

    I think the major issue is that a client that implements both OSCORE and
    DTLS cannot just switch from one mechanism to the other because it must
    stick to either one or the other. This also raises the question what
    happens if an AS is contacted by the client via OSCORE but the RS only
    supports DTLS: Is the client allowed to switch from OSCORE to DTLS if
    the AS says so?

    Another aspect is that we would need to add another specification if a
    client implementing the DTLS profile wants to contact the AS via TLS. As
    CoAP over TLS is well-defined, this would not make any difference
    regarding the security or the handling in the application, but mandating
    DTLS in the profile would currently preclude the use of TLS.

    Grüße
    Olaf





    --
    Daniel Migault

    Ericsson





    --
    Daniel Migault

    Ericsson


--
Daniel Migault
Ericsson