[core] Invitation to New Non-WG Mailing List: Authentication and Authorization for Constrained Environments (ace)

Stefanie Gerdes <gerdes@tzi.de> Wed, 11 December 2013 13:49 UTC

Return-Path: <gerdes@tzi.de>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D17641ADE7C; Wed, 11 Dec 2013 05:49:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.551
X-Spam-Level:
X-Spam-Status: No, score=-3.551 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, GB_I_INVITATION=-2, HELO_EQ_DE=0.35, SPF_HELO_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SZ-07BSEa9s7; Wed, 11 Dec 2013 05:49:05 -0800 (PST)
Received: from informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) by ietfa.amsl.com (Postfix) with ESMTP id 364A81ADDDA; Wed, 11 Dec 2013 05:49:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from smtp-fb3.informatik.uni-bremen.de (smtp-fb3.informatik.uni-bremen.de [134.102.224.120]) by informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id rBBDksGc018161; Wed, 11 Dec 2013 14:46:55 +0100 (CET)
Received: from [134.102.218.230] (dynamic-218-c.informatik.uni-bremen.de [134.102.218.230]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by smtp-fb3.informatik.uni-bremen.de (Postfix) with ESMTPSA id 7D110C4B; Wed, 11 Dec 2013 14:46:54 +0100 (CET)
Message-ID: <52A86CCE.3090906@tzi.de>
Date: Wed, 11 Dec 2013 14:46:54 +0100
From: Stefanie Gerdes <gerdes@tzi.de>
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.0.1
MIME-Version: 1.0
To: "core@ietf.org" <core@ietf.org>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: saag@ietf.org, dtls-iot@ietf.org, jose@ietf.org, oauth@ietf.org
Subject: [core] Invitation to New Non-WG Mailing List: Authentication and Authorization for Constrained Environments (ace)
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Dec 2013 13:49:08 -0000

Hi everybody,

As a result of discussions in the CoRE WG in Berlin and Vancouver the
new non-WG mailing list Authentication and Authorization for Constrained
Environments (ace) was created.

The purpose of this list is to organize interest in a group to define
the charter for work on Authentication and Authorization for Constrained
Environments.

Our mailing list can be found at (1), existing work can be found at (2),
and the draft charter can be found at (3).

Please feel welcome to join the list and provide your feedback!

Thanks,

Kind Regards
Kepeng & Stefanie


(1)Mailing List

https://www.ietf.org/mailman/listinfo/ace

(2)Existing work:

Use Cases:
http://tools.ietf.org/id/draft-garcia-core-security
http://tools.ietf.org/id/draft-greevenbosch-core-authreq
http://tools.ietf.org/id/draft-seitz-core-sec-usecases

Solutions
http://tools.ietf.org/id/draft-gerdes-core-dcaf-authorize
http://tools.ietf.org/id/draft-kang-core-secure-reconfiguration
http://tools.ietf.org/id/draft-selander-core-access-control
http://tools.ietf.org/id/draft-zhu-core-groupauth
http://tools.ietf.org/id/draft-pporamba-dtls-certkey
http://tools.ietf.org/id/draft-schmitt-two-way-authentication-for-iot
http://tools.ietf.org/id/draft-seitz-core-security-modes

(3)Draft Charter - Authentication and Authorization for Constrained
Environment (ACE)

The CoAP (Constrained Application Protocol) is a light-weight
application layer protocol, especially suitable for applications such as
smart energy, smart home, building automation, remote patient monitoring
etc. Due to the nature of these applications, including a critical,
unattended infrastructure and usage in the personal sphere, security and
privacy protection are critical components.

Currently, a problem with constrained devices is the realization of such
secure communication. The devices only have limited resources such as
memory, storage and transmission capacity. These constraints severely
limit the security functions and communications the device can perform.
Missing functionality includes authentication, which provides trust and
ensures an entity is who it says it is, and authorization, which defines
and enforces access rights for different clients.

The ACE WG focuses on providing constrained devices with the necessary
prerequisites to use REST operations in a secure way. Constrained
devices will thus be enabled to authenticate communications from other
(constrained or less-constrained) devices, to communicate securely with
them and to verify their individual authorization to access specific
resources. To achieve this, ACE will be able to employ an architecture
with one or more trusted less-constrained devices which will relieve the
constrained nodes from complex security related tasks (e.g. managing
authorization policies and a large number of keys). ACE will use CoAP
and employ security properties of DTLS whenever possible.

The ACE WG has the following tasks:
- Document the use cases and high-level requirements for secured
communication between constrained devices.
- Define certificate profiling (what kinds of certificates and which
attributes are to be used).
- Define a mechanism for authenticated and protected transfer of
authorization information suitable for constrained device to constrained
device communication.
- Define an access ticket and authorization information format suitable
for constrained devices.
- Define bootstrapping for authorization information using the Resource
Directory.