[core] CoRE @ IETF 110 - Minutes and summary
Marco Tiloca <marco.tiloca@ri.se> Sat, 13 March 2021 18:47 UTC
Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A1643A1444 for <core@ietfa.amsl.com>; Sat, 13 Mar 2021 10:47:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yCnOB7_8llwF for <core@ietfa.amsl.com>; Sat, 13 Mar 2021 10:47:42 -0800 (PST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80054.outbound.protection.outlook.com [40.107.8.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FF143A1440 for <core@ietf.org>; Sat, 13 Mar 2021 10:47:42 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CgwKUez6vegobW1ByvQZJ+RwE5B4nchVQcVwa7ypzdVRP+YfgD7pTfc0Yc+/EJAQOgiQIeMaIKB6K6/BfjmlWBM/zjFGE291sWT70qvhiNgNhQCEVA1idco4DsHv1WXhmzkWT1MQrX0vIidjJ5V35qlWulseb0Cv/wjmaSl0vOq5AGtMNwk/pnh9A5Du6L5WXt4sfD8/2M6l5Q7580WiaRjnALDMZyzspnJy/+F05KINzTPQqgf34/KO90E0IFJqSAx6muN6edRwXaeB4qKK7LwCcTscNceFwFgvJR4VFB2bLDdZm6el9Q1GKGfezOD+dnUI5bqDuVs2KAX8XhyerA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HHTtOIcw4TVOsTdoz2sw32+sdnLcJgvag2gT3Y+2POo=; b=nDWBjqi1j2KX38z46QCKuYe2TYUBa+e1KdJCj9GcPOEIA7tiLiuAJfu7wttaPmN94YY6QpgG0v5MO3TJl305bTbqoxqW+kgzyD+fKprRzeB4ZSmGExfDpHMnJe4N5DnVmRIMV+bnC6PhmazAoP8Y3TbkMeqxRGhY0ouyQyzutwPS2uu0WAZGU90tBKsiy172/Fs5Zk/BnHO1YEkgiggQSTHR4kt07ZUXaB5syosuHVc21IpSH5fXOX8M5q+/reTUOpE3liXxlvUX43tyX+wJ9i5yxDuI1vfT4x0Y3YCH3b0GtBW21ydsSZ0zc1+P+BQwY89HhQKjtPdEzQb80rrh+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HHTtOIcw4TVOsTdoz2sw32+sdnLcJgvag2gT3Y+2POo=; b=BKsPBn4ODFDr/FaFI5uGzqflUwjypu0CsfHGuherbV7G0xU78yKwfAYBXOVChrD1v7PcWQ4jylxSh4NrpmGaZg6LCSc9MetXuXQBHlYyALlbEPqYfWoID/EsNQ7aQ1k5PV4pbWQrUNBMlqJD7FbEFKxSo4oA/rHVUMNu3zsZly4=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by DB9P189MB1596.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:2a7::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3933.32; Sat, 13 Mar 2021 18:47:37 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::1df7:be0c:4934:88bf]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::1df7:be0c:4934:88bf%9]) with mapi id 15.20.3933.031; Sat, 13 Mar 2021 18:47:37 +0000
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Message-ID: <63c6b5e8-21bf-bed4-53f1-b3885a138464@ri.se>
Date: Sat, 13 Mar 2021 19:47:35 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="ltiLYQwnTXjIeq4MOJeb3okMz3dx20mV0"
X-Originating-IP: [45.83.91.164]
X-ClientProxiedBy: HE1PR07CA0026.eurprd07.prod.outlook.com (2603:10a6:7:66::12) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [10.8.3.3] (45.83.91.164) by HE1PR07CA0026.eurprd07.prod.outlook.com (2603:10a6:7:66::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3955.11 via Frontend Transport; Sat, 13 Mar 2021 18:47:37 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6d4afe70-9e87-4f8f-dc6b-08d8e650790c
X-MS-TrafficTypeDiagnostic: DB9P189MB1596:
X-Microsoft-Antispam-PRVS: <DB9P189MB1596D088FB69B0C77CF2EE47996E9@DB9P189MB1596.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: JhlUx1zo+hEhbzRFbEwnwd7D7dcgjwytW+78qP8G71WbN0m4vcNYriZ0Orko3FFLLyCI67nk4PawNfdQXqUQPRt5aNPn4q7gDJgDWb87shPQUpG5oFIIE7wqovsuDd2L48Zx3x8ZpZzAjxyLDYsScJmz3W/hCZzdAWSdLZ4EFIQkURK6vcf9Gxcf56yu900zXNgfIwAZqCkkzQDxodFSKl2OYsG3IO0Qai28jerAafYApc8ZtXDUGEkLaSuOop/qgmpf+/RqPouf8tm8g+UmkeC1onCAtYm2O2BPyEhWrciZGBPAAZqA4LbgVkhEgNMnctNxW+lR/S8xQsuw8AkwJmW7JKsm478PEqZNB5h+fslRDvOaqQROzBB4mRyXlCj/0/LhoePsDAiXqiIpTN4/S0AhAfAMSHGSMesSGbMtx15sH7AJEqQSdXVHbWGzFO9pfXH79NkArtQLu8pZLxz42SqCGSaXl0X294e05o3LiSaxUYjGGhYlBiX/XDQNgcJ9fVEtVQl01w/l/E8k7fTowWM1XDPXodIR06dADBjpN/FtcEvcnJT8wi1/etN0wUX+dwSMz7UxSrJU9e265rBCos+EsXI2ZeKnnXBWp4+eUeoNoXutQKvnwMF18/Rcvcw9uJzYSGr98faXcCYAi01hdSXgS2Jh0RGoBwoQczxta7Dh8SmnAugaorCcKrfk4AOzheRcsoBzDSHFZwqVwmhKNAwhUKIzAlA2ojau359ugG8=
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(39840400004)(396003)(136003)(366004)(376002)(346002)(83730400007)(30864003)(6486002)(235185007)(478600001)(83380400001)(66616009)(66574015)(66556008)(6916009)(5660300002)(31696002)(36756003)(66946007)(86362001)(16576012)(26005)(2616005)(186003)(44832011)(16526019)(21480400003)(956004)(8676002)(966005)(316002)(2906002)(31686004)(8936002)(33964004)(66476007)(52116002)(43740500002)(45980500001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData: z6pBmqRzwwktDHdd8EPflV8HYbtSV3IhvSZqa6/ETIICxueENfqArBctude3Fyf1qrp4sgDBhCdds3uTvwYXHcx8g0RAaxbk/jpU9eGgxCfQ9LbNFMzVFh3mICb2oAYZ3SZBk0PdGhKb2NLxrrndPZpQNQZrHmxWNId29OT+hLUykxhngip9GAdaGwvYvLZdZqXgvSNttWVQuZZ3Vgqz5gd3O1oUOZCaNQfKnx96IFPYldScktZ/ft1prBOphfmPl4ezVT8/ifR1YYOxKzqx9deQIYWkACchZd4VQjKNr5tDq6uvIwVNLz4B1egaSOWJj6iTLDcAXq5bGZonSXxeORZ/TWmEtPBWZUyRWtvn2LSFvxwSzkXqKbM9X96frTNVMv7VvfqF20750t18Ii9z18fXFHP3YcOPunhsTpiZgJE7w9UcmlEAyaJwgYgsQEjFSMLIqNVLQKHe9qXO0R9o4AbogrpLnrfIicbzVzPtLT4mPJofpdb+KLBrcNyd+F6RTOKCu+Nvx8YZFtoiRGczuYNKRTKWxfrA08eMJT1fIMqXnlDKfO9Vo5T6Vl8KERMHKcnOXRzdAS8qpnqfSaA6pfxMO7d+rERMGokOCKKSKLNBoRsJG0eTmbBkdic+7yWRI2saa4hNRqvqHSlhhrOjW3lSbFGSX9IJ1KD/Yt+tbfndPeuOfNdcr0a7y3u1VwYFk13HuxNosT25b2A27K5PTfUArswG/+pt2w8O16AwisBOiTfH1hq5LjkLhYp1Pl8MxjAb/L5tJlH+vTL/zzepBWWJjL7Gn/2G5m0yaMwf8TNYUZik+H0qqT5+efYguK+Ir+xEhEMEyVjlIPPp+TLoba7/uCNaJheS0+jLT6KkH8/gtSrtkwxVLXv1c0561RZhhx1txPK6eAzxP6ZNtPxi44oWmu1GySWjz9iHvAHCwR7duIpfTYv3kq+V/GGSZC66tK454IiUak7cjRZuZtYDBwImLedlYlf6OL7qXS5roGCfgSZ26cxcM3XD0YCWSDvOBsoQl/AjTDoq8iyKpOt6N+BpAUshnZ5aqo15JdVFUuV3XoL50x7pPzdAYdSpMtx0m7AFZF38a4j4BVHqCJcyyxVh9CbsFKhBvUVeptDixLlLGYxijDJBIlMDLD34B3Hud2gJS2F/wrm3g2sAN588nYCkvmQZDpmAcLYdpe54DUcvmEB34Lv203tG0UJPFQxT4bTE6JDxxCRrn3xW1DLLijVhNp8uKGUxlK9VBotIOjXyiVzM3n8/ODLfW4ni3uHq8i6rGQum4lJG1OSOoSH8N+0SqN0LLXKZ5GfSvcIhBg0yGCpnm4So4vTO8gSQiO3u
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 6d4afe70-9e87-4f8f-dc6b-08d8e650790c
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Mar 2021 18:47:37.7534 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gycScLm7qVHsvmgL0HWaK9gv0KdEsIwgffsvg3wpem3JWiRahZ4Z5G/DXOyxmq7+xZZJuiu044QNCeh8AOl9IA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9P189MB1596
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ZYCR84mPrAvGFFIw_efP6ZnTYjM>
Subject: [core] CoRE @ IETF 110 - Minutes and summary
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Mar 2021 18:47:47 -0000
Dear all, The minutes for the two CoRE sessions are available at [1]. Thanks a lot to the note takers Michael Richardson, Göran Selander and Rikard Höglund! Please, send possible fixes and updates to core-chairs@ietf.org or to the mailing list, preferably within the next 7 days. The recordings of the two CoRE sessions are available at [2][3]. Finally, you can find below the usual summary of the two sessions, with fewer technical details. This summary is also available at [4]. Thank you all for your participation and contribution! Best, Marco and Jaime [1] https://datatracker.ietf.org/meeting/110/session/core [2] https://www.youtube.com/watch?v=GteEGOyW5JI [3] https://www.youtube.com/watch?v=VKhUnOji8XA [4] https://github.com/core-wg/wg-materials/blob/master/ietf110/core-110-summary.md ---------- # Summary ## WG and document status Carsten Bormann standing in as chair for Jaime during IETF 110. Thanks to Barry Leiba as outgoing AD, welcome to Francesca Palombini as new AD. * Published * RFC 8974 (was draft-ietf-core-stateless) * RFC Editor Queue * draft-ietf-core-dev-urn-11 * IESG Processing: * draft-ietf-core-resource-directory-28: Approved-Announcement Sent * draft-ietf-core-echo-request-tag-12: Approved-Announcement to be Sent::Revised ID Needed * In Last Call * draft-ietf-core-yang-cbor-15: In Last Call, until 2021-03-17 * draft-ietf-core-sid-15: In Last Call, until 2021-03-17 * In Post-WGLC processing: * draft-ietf-core-yang-library-03: waiting for shepherd write-up * draft-ietf-core-comi-11: waiting for shepherd write-up * draft-ietf-core-oscore-groupcomm-11: processed WGLC comments and one more review; ongoing work on open points * draft-ietf-core-senml-data-ct-03: processed WGLC comments; synch with draft-bormann-core-media-content-type-format * draft-ietf-core-new-block-07: processed WGLC comments ## Groupcomm-bis * draft-ietf-core-groupcomm-bis-03 Latest updates include: support for reverse proxies; caching of responses, with two types of cache entries at the proxy; a response validation model between client and servers with a new Multi-ETag option, and between client and proxy with a new Group-ETag option. Cacheability with end-to-end security is still possible using the deterministic requests of draft-amsuess-core-cachable-oscore. It is preferable to move the new part on response validation to a different document, e.g. draft-tiloca-core-groupcomm-proxy. Next steps are about addressing open Github issues; moving some content to the rights places / different documents; implements aspects involving e.g. observe and blockwise. ## Group OSCORE * draft-ietf-core-oscore-groupcomm-11 Latest updates addressed points raised at IETF 110 and from Christian's review at https://mailarchive.ietf.org/arch/msg/core/pXEyxhbf-s2wgGDzrDhUNPsHZZc/ Two main open points remain. 1. Admit the recycling of Group IDs, as currently forbidden to avoid problems with long-living observations. This can rely on the Group Manager storing for each group member the GID used in the group when that member joined, and adapting group rekeying processes accordingly. No objection to this update. 2. Related to Github issues #72 and #73, on using the same identity key for both signing and Diffie-Hellman key derivation for the pairwise mode. Not really a common practice, need to be proven secure. Point originally raised by Ben Kaduk https://mailarchive.ietf.org/arch/msg/core/ujj_I-LlqW9fq__quh-YqKS0fF0/ There's a pre-print in progress, to prove that the approach is secure, possibly after minor changes to the exact key derivation steps. A less preferable alternative is to have storage and provisioning of separate signing and Diffie-Hellman keys. More on this point in the next months. Plan for v -12 is to address the two open points above. That should be a stable version, there are no other known issues. ## OSCORE Group Discovery * draft-tiloca-core-oscore-discovery-08 This method uses the Resource Directory to discover links to an OSCORE group manager, hence to discover OSCORE groups and how to join them. The latest updates include information on the pairwise mode of Group OSCORE; consider also the signature verifier as possible client; revise the examples. Marco's implementation has been tested against Christian's RD, covering all the steps defined in the draft. https://bitbucket.org/marco-tiloca-sics/ace-java/src/master/src/test/java/se/sics/ace/interopGroupOSCORE/CoAPEndpointToResourceDirectory.java coap://rd.coap.amsuess.com The next version will have more security considerations and will align with latest additions to the RD document. Plan to integrate the individually implemented steps into the actual joining node and Group Manager. The document needs reviews. ## Multicast Notifications * draft-tiloca-core-observe-multicast-notifications-05 This method enables a server to send multicast notifications to a group of clients. Possible to also use Group OSCORE. The server sends a phantom observation request to itself; observe notifications are responses to that request. This version has a new encoding for informative error responses to the clients; a new encoding for expressing addressing information in the informative responses; optimization for a server self-managing its OSCORE group and for having the phantom request as a deterministic request (see https://datatracker.ietf.org/doc/draft-amsuess-core-cachable-oscore/) Next steps include considering also reverse proxies and deterministic requests used together with proxies. All main components are already in place. In-room consensus for adoption: +13 in favor, no objections. To be confirmed on the mailing list. Will review: Esko, Göran Planned implementations: Christian, Marco ## Groupcomm proxy * draft-tiloca-core-groupcomm-proxy-03 - Discuss updates and open points The document describes a signaling protocol with two new CoAP options, to enable proxies in group communication. This last version has especially revised the encoding of server's addressing information conveyed in one of the options; and has added also support for reverse proxies (with two examples). Appendix A defines "OSCORE in OSCORE" as useful here for the proxy authenticating the client before forwarding, but it is actually forbidden by RFC 8613. Now we have use cases for it, but it would require proper definition, analysis and update of RFC 8613. Support to move out "OSCORE in OSCORE" and have it in a separate dedicated document. Possible collision of identifiers would be possible to address leveraging differences in transport information. Next steps are about addressing raised points raised and covering the case where client and cross-proxy talk HTTP. Earlier promised reviews: Christian and Carsten. ## Cacheable OSCORE * draft-amsuess-core-cachable-oscore-01 This method enables caching of OSCORE-protected responses; all group members can act as a deterministic client with a well-known Sender ID and Sender Key. The exact encryption key is derived for each different request. The key derivation process is similar to the one in the pairwise mode of Group OSCORE. One trades some security properties with enabling cacheability. This also improves the way things work in https://datatracker.ietf.org/doc/draft-tiloca-core-observe-multicast-notifications/ During the hackathon, Marco and Christian interoped and decrypted each others' deterministic requests. Finding from the hackathon improved some design aspects, already in the editor's copy. Next steps are more interop, process the feedback and then go for a proper review with security in mind. ## OSCORE with EDHOC * draft-palombini-core-oscore-edhoc-02 This method combines the last EDHOC message to establish an OSCORE security context together with the first CoAP request protected with that OSCORE context. The last version has determined one specific approach based on a new EDHOC option with zero-length; and added an optimization, i.e. only part of the EDHOC message goes on the wire, while the rest can be reconstructed by the server, saving at least 2-4 bytes. Next will be to keep this in synch with the main EDHOC document; some specific point can better fit in this document. In-room consensus for adoption: +9 in favor, one "not raise hand" (not against, but not sure either), no objection. To be confirmed on the mailing list. ## AEAD limits in OSCORE * draft-hoeglund-core-oscore-key-limits-00 This considers the AEAD cipher limits defined in https://datatracker.ietf.org/doc/draft-irtf-cfrg-aead-limits/ , and defines additional actions for OSCORE. Need to count key usages and renew the OSCORE context of the two peers when a limit is passed. One limit 'q' is about performed encryptions with a key, while 'v' is about failed decryptions using a key. Plan to cover more algorithms than CCM_8 and give optimizations for constrained devices and implementation guidelines. * https://mailarchive.ietf.org/arch/msg/core/h5JHgX5wTBkJtrKl_ezswiCdUBI/ The above is important to happen in OSCORE. Renewing the security context might also be useful to do for other reasons like for counteracting key compromise, especially if the rekeying provides perfect forward secrecy. The original procedure used to compute the limit considers arbitrary assumptions that yield the actual limits now considered in the draft. It's also unfair to some particular algorithms. It would be good to have an overall revision of that procedure. OSCORE in particular may consider more appropriate values. The possible revision of the procedure belongs to somewhere else; the document above can still recommend better values to use, with some short explanations. ## CORECONF Comi * draft-ietf-core-comi-11 The CORECONF documents core-sid and core-yang-cbor are in last call. Got comments for core-sid on the intentional creation of a new global naming system; good to get views from the security community. For core-comi issues came up during the shepherd write-up preparation: from netmod on incompatibility between uint8 and int8; string that may not be URL-safe; definition of "CBOR key"; key vs. CBORencode(key). Also required for minor clarifications when using blockwise transfers and pagination, and about leading zeros in base64 encoding of SID numbers. A revised version is needed as addressing these points. Changes to the above encoding should not be an issue for implementations. Then to be checked if a new Working Group Last Call is needed. ## SenML Versions * draft-ietf-core-senml-versions-02 This version addresses comments from Jaime (e.g. approach to bitmapping a number). Ari added to his SenML validator the bit for additional units. Ready to move on. We will start a Working Group last call. ## SenML Data CT * draft-ietf-core-senml-data-ct-03 This version provides editorial clarifications and decompression bomb security consideration. Still having a normative reference to draft-bormann-core-media-content-type-format (MCTF), which seems to require some time to become an adopted document, based on the Monday discussion in DISPATCH. Proposed to remove MCTF as normative reference, and include into senml-data-ct only the minimal set of things needed from MCTF. This seems good and straightforward, but better to first wait for more discussion in DISPATCH before deciding. The two documents can anyway separately proceed in parallel. Next step is to have a a Pull Request on the senml-data-ct document to gain time and be ready to take the new direction. ## New Block * draft-ietf-core-new-block-07 Addressed WGLC comments and further follow-up comments from Christian. Other than technical refinements, this version provides better clarifications on being specific for the DOTS use case. Available implementation based on libcoap, to which a PR has been submitted. Has been tested in DOTS environment and behaving as expected. Reviewers largely happy with the current version. This can be seminal material for a possible blockwise-bis. The document will move forward; Marco will be shepherd and start the shepherd review and write-up soon. ## Dynlink * draft-ietf-core-dynlink-13 This version incorporates latest feedback also based on discussion at the latest interim. The Conditional Attributes have been separated into Conditional Notification Attributes and Conditional Control Attributes. New attributes "edge" and "con" have also been added. Required harmonization for the use of the attributes "band" and "con", having in mind the use that LwM2M does of the defined parameters. http://www.openmobilealliance.org/release/LightweightM2M/V1_2-20201110-A/HTML-Version/OMA-TS-LightweightM2M_Core-V1_2-20201110-A.html#Table-512-2-lessNOTIFICATIONgreater-class-Attributes The first part, about the parameters, is pretty mature now. The second part on the dynamic link concept needs more discussion and work. The two parts are independent. Agreement in the group to split the current document into two different documents about the two different parts above. The dynlink document will be the one focused on the link material. Work is needed also on covering a case with proxies, looking at interactions as end-to-end or hop-by-hop. So far the hop-by-hop approach has been privileged. In either case, the impact of possibly present proxies has to be considered. ## RD extensions and protocol negotiations * draft-amsuess-core-resource-directory-extensions-05 * draft-amsuess-core-transport-indication-00 The first document defines RD extensions as to what you can do with the RD without changing the spec. This includes the reverse proxy extension, for asking the RD to provide a publicly reachable name and act as a reverse proxy. Often used (also during the IETF 110 hackathon); most of LWM2M uses a similar mechanism. The RD may also partially partner with a proxy. The undesirable side effect is URI aliasing, which can be avoided if devices use the RD only as proxy. Similar problem in protocol negotiation case, coap+tcp:// and coap:// both collapse to a same resource. To avoid that, the second document suggests an approach for proxy discovery. A server announces that it has a proxy at a location, by using link-relations. Everything hosted on this host is reachable via a specific proxy. No URI aliasing in the application (possibly only on the wire). Next steps are to gather feedback, tuning relations, and update the RD extensions to show how it can be used. Some security considerations can be further elaborated by building on some from the HTTP working group. ## A Data-centric Deployment Option for CoAP * draft-gundogan-core-icncoap-00 This draws parallels between ICN and CoAP deployments, already shared with the ICN community. ICN allows not specifying a server endpoint, but rather focuses on content delivery, using name-based stateful forwarding and content caching. Possible to use object security end-to-end protection (also to cached content); all hops on the path creates state, which is consumed when a response traverses back. This can also prevent traffic amplification (DDOS). Caching is hop-wise, so retransmission can originate from any intermediate entity in the path, which reduces link traversals. Tried already with OSCORE, using cacheable OSCORE, see https://datatracker.ietf.org/doc/draft-amsuess-core-cachable-oscore/. It worked quite good, with improvement of success rates in lossy network. A related paper from 2020 considers a CoAP deployment similar to an ICN deployment using only standard CoAP features. Most ICN systems support multiparty communication (mostly using request aggregation and response fan-out, or request fan-out and response deduplication). Ongoing work to provide more results with multi-party communication. Future work to allow dynamic proxy discovery. The Resource Directory can help to discover links and as announcement point for routes (especially to a particular good next-hop proxy). This is an unconventional way of deploying CoAP but worth exploring in CoRE; it's not out of scope. It can also be discussed in T2TRG. Since firmware update is a good use case, also the SUIT Working Group can be interested. This approach allows to retrieve an update from the closest location, rather than always from a certain update server. For the multi-party case, there are building blocks for this too as work in progress in CoRE. -- Marco Tiloca Ph.D., Senior Researcher RISE Research Institutes of Sweden Division ICT Isafjordsgatan 22 / Kistagången 16 SE-164 40 Kista (Sweden) Phone: +46 (0)70 60 46 501 https://www.ri.se
- [core] CoRE @ IETF 110 - Minutes and summary Marco Tiloca