Re: [core] Conclusion -- Endpoint Client Name / Endpoint Name in RD draft

Jim Schaad <ietf@augustcellars.com> Mon, 18 June 2018 12:28 UTC

Return-Path: <ietf@augustcellars.com>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 51B57130F04 for <core@ietfa.amsl.com>; Mon, 18 Jun 2018 05:28:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eMboZ_sgeFyy for <core@ietfa.amsl.com>; Mon, 18 Jun 2018 05:28:15 -0700 (PDT)
Received: from mail2.augustcellars.com (augustcellars.com [50.45.239.150]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 84782130F27 for <core@ietf.org>; Mon, 18 Jun 2018 05:28:14 -0700 (PDT)
Received: from Jude (73.180.8.170) by mail2.augustcellars.com (192.168.0.56) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Mon, 18 Jun 2018 05:25:10 -0700
From: Jim Schaad <ietf@augustcellars.com>
To: consultancy@vanderstok.org
CC: 'Hannes Tschofenig' <Hannes.Tschofenig@arm.com>, core@ietf.org
References: <VI1PR0801MB2112B9A4410DA3EDE39183BEFA9B0@VI1PR0801MB2112.eurprd08.prod.outlook.com> <9970c70fea6ea457c74c8ae3ca303f76@xs4all.nl> <4EBB3DDD0FBF694CA2A87838DF129B3C01F48F8A@DEFTHW99EL4MSX.ww902.siemens.net> <VI1PR0801MB2112CCC0F54274336BFE3EB7FA930@VI1PR0801MB2112.eurprd08.prod.outlook.com> <3b2ad29ec49c83c31646b38e856c0ae7@xs4all.nl> <29a9636a3703e43947fce2f4cb900825@bbhmail.nl>
In-Reply-To: <29a9636a3703e43947fce2f4cb900825@bbhmail.nl>
Date: Mon, 18 Jun 2018 05:28:06 -0700
Message-ID: <00d001d406ff$d1392f80$73ab8e80$@augustcellars.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00D1_01D406C5.24DB41E0"
X-Mailer: Microsoft Outlook 16.0
Content-Language: en-us
Thread-Index: AQLSQRyK31kKN7geubfCKDOvczH9iQKw5U1yAihxEq4C310y0gFDLGVkAV7n08KiFqXZAA==
X-Originating-IP: [73.180.8.170]
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/GiqX9kXHs-SK09ftpk0fW9KRvOg>
Subject: Re: [core] Conclusion -- Endpoint Client Name / Endpoint Name in RD draft
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jun 2018 12:28:25 -0000

A couple of fast comments below

 

Jim

 

 

From: core <core-bounces@ietf.org> On Behalf Of Peter van der Stok
Sent: Monday, June 18, 2018 2:53 AM
To: consultancy@vanderstok.org
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; core@ietf.org
Subject: Re: [core] Conclusion -- Endpoint Client Name / Endpoint Name in RD draft

 

HI Hannes, Matthias,

After some additional discussions, I think it is best to write an extra section into the resource-directory draft.
Please have a look at my suggestion below.

@Hannes, can you comment on the correctness and sufficiency of the text? thanks,

Peter

________________________________________________________

Ietf-core-resource-directory text proposal.

Suggestion to add a new section x on Authorization.

Section x, use of Authorization Server.

When threats may occur as described in section 8.1, an Authorization Server (AS) as specified in ietf-ace-oauth-authz SHOULD be used. A request to the Resource Directory is accompanied 

[JLS] s/as specified/like the one specified/

by an Access Token that validates the access of the client to the RD. The URI of an authorized request cannot contain the ep= or the d= parameters. When these parameters are present, the request is rejected with CoAP response code 4.00 (bad request). The identifier part of the security context in the Access Token is used to assign a value to the endpoint name of the endpoint to be registered. Three possibilities are supported:

1.	For PSK-based credential, the Endpoint Name becomes the PSK Identity

[JLS] PSK identities are binary and not text strings so a mapping is going to be needed here as with RPKs.

2.	For raw-public keys, the Endpoint Name becomes the SubjectPublicKeyInfo structure (or a hash of it).
3.	For certificates, the Endpoint Name becomes the leftmost CN component of subject name or the SubjectAltName of the certificate, depending on what is used.

An access token MAY include one of the two following new claims:

“epn” endpoint name with value the identifier part of one of the 3 possible identifier parts of the security ccontext.

[JLS] Why not use the ‘normal’ subject name? Would you think that they are the same or different?

“dnm” domain name with value “name of the domain”

Three scenarios for registration in the RD MUS be supported.

Section x.1 endpoint registers with RD

The endpoints sends a Request to the RD accompanied by a CBOR Web Token (CWT). The identifier part of the security context is used to assign the endpoint name.

Section x.2 3rd party Commissioning Tool (CT) registers endpoint with RD.

The CT sends a Request to the RD accompanied by a CBOR Web Token (CWT). The identifier part of the CWT refers to the security context of the CT. The CWT validates the registration by the CT. The CWT MUST contain the “epn” claim to assign a value to the endpoint that is registered. The CWT MAY contain the “dnm” claim to assign a domain name.

Section x.3 Updating multiple links

Section 5.4.4 of RD specifies that multiple links can be updated with a media format to be specified. The updating endpoint sends a Request to the RD accompanied by a CBOR Web Token (CWT). The identifier part of the CWT refers to the security context of the updating endpoint. The updating endpoint is authorized to change all links of all existing registrations but MUST NOT delete or add registrations.

IANA regsitration.

Two new parameters need to be registered in the OAuth Parameter Registration with names ""epn" and "dnm".

The last paragraph in section 8.1 is to be replaced:
OLD
"Therefore, Endpoints MUST include the
Endpoint identifier in the message, and this identifier
MUST be checked by a resource directory to match the Endpoint identifier
included in the Registration message."
NEW
"Therefore, Endpoints SHOULD follow the guidelines of section x."