[core] CoRE @ IETF 110 - Minutes and summary

Marco Tiloca <marco.tiloca@ri.se> Sat, 13 March 2021 18:47 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A1643A1444 for <core@ietfa.amsl.com>; Sat, 13 Mar 2021 10:47:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, MSGID_FROM_MTA_HEADER=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yCnOB7_8llwF for <core@ietfa.amsl.com>; Sat, 13 Mar 2021 10:47:42 -0800 (PST)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80054.outbound.protection.outlook.com [40.107.8.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2FF143A1440 for <core@ietf.org>; Sat, 13 Mar 2021 10:47:42 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CgwKUez6vegobW1ByvQZJ+RwE5B4nchVQcVwa7ypzdVRP+YfgD7pTfc0Yc+/EJAQOgiQIeMaIKB6K6/BfjmlWBM/zjFGE291sWT70qvhiNgNhQCEVA1idco4DsHv1WXhmzkWT1MQrX0vIidjJ5V35qlWulseb0Cv/wjmaSl0vOq5AGtMNwk/pnh9A5Du6L5WXt4sfD8/2M6l5Q7580WiaRjnALDMZyzspnJy/+F05KINzTPQqgf34/KO90E0IFJqSAx6muN6edRwXaeB4qKK7LwCcTscNceFwFgvJR4VFB2bLDdZm6el9Q1GKGfezOD+dnUI5bqDuVs2KAX8XhyerA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HHTtOIcw4TVOsTdoz2sw32+sdnLcJgvag2gT3Y+2POo=; b=nDWBjqi1j2KX38z46QCKuYe2TYUBa+e1KdJCj9GcPOEIA7tiLiuAJfu7wttaPmN94YY6QpgG0v5MO3TJl305bTbqoxqW+kgzyD+fKprRzeB4ZSmGExfDpHMnJe4N5DnVmRIMV+bnC6PhmazAoP8Y3TbkMeqxRGhY0ouyQyzutwPS2uu0WAZGU90tBKsiy172/Fs5Zk/BnHO1YEkgiggQSTHR4kt07ZUXaB5syosuHVc21IpSH5fXOX8M5q+/reTUOpE3liXxlvUX43tyX+wJ9i5yxDuI1vfT4x0Y3YCH3b0GtBW21ydsSZ0zc1+P+BQwY89HhQKjtPdEzQb80rrh+A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HHTtOIcw4TVOsTdoz2sw32+sdnLcJgvag2gT3Y+2POo=; b=BKsPBn4ODFDr/FaFI5uGzqflUwjypu0CsfHGuherbV7G0xU78yKwfAYBXOVChrD1v7PcWQ4jylxSh4NrpmGaZg6LCSc9MetXuXQBHlYyALlbEPqYfWoID/EsNQ7aQ1k5PV4pbWQrUNBMlqJD7FbEFKxSo4oA/rHVUMNu3zsZly4=
Authentication-Results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=ri.se;
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14) by DB9P189MB1596.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:2a7::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3933.32; Sat, 13 Mar 2021 18:47:37 +0000
Received: from DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::1df7:be0c:4934:88bf]) by DB8P189MB1032.EURP189.PROD.OUTLOOK.COM ([fe80::1df7:be0c:4934:88bf%9]) with mapi id 15.20.3933.031; Sat, 13 Mar 2021 18:47:37 +0000
From: Marco Tiloca <marco.tiloca@ri.se>
To: "core@ietf.org WG (core@ietf.org)" <core@ietf.org>
Message-ID: <63c6b5e8-21bf-bed4-53f1-b3885a138464@ri.se>
Date: Sat, 13 Mar 2021 19:47:35 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.7.1
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="ltiLYQwnTXjIeq4MOJeb3okMz3dx20mV0"
X-Originating-IP: [45.83.91.164]
X-ClientProxiedBy: HE1PR07CA0026.eurprd07.prod.outlook.com (2603:10a6:7:66::12) To DB8P189MB1032.EURP189.PROD.OUTLOOK.COM (2603:10a6:10:16e::14)
MIME-Version: 1.0
X-MS-Exchange-MessageSentRepresentingType: 1
Received: from [10.8.3.3] (45.83.91.164) by HE1PR07CA0026.eurprd07.prod.outlook.com (2603:10a6:7:66::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3955.11 via Frontend Transport; Sat, 13 Mar 2021 18:47:37 +0000
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 6d4afe70-9e87-4f8f-dc6b-08d8e650790c
X-MS-TrafficTypeDiagnostic: DB9P189MB1596:
X-Microsoft-Antispam-PRVS: <DB9P189MB1596D088FB69B0C77CF2EE47996E9@DB9P189MB1596.EURP189.PROD.OUTLOOK.COM>
X-MS-Oob-TLC-OOBClassifiers: OLM:10000;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: JhlUx1zo+hEhbzRFbEwnwd7D7dcgjwytW+78qP8G71WbN0m4vcNYriZ0Orko3FFLLyCI67nk4PawNfdQXqUQPRt5aNPn4q7gDJgDWb87shPQUpG5oFIIE7wqovsuDd2L48Zx3x8ZpZzAjxyLDYsScJmz3W/hCZzdAWSdLZ4EFIQkURK6vcf9Gxcf56yu900zXNgfIwAZqCkkzQDxodFSKl2OYsG3IO0Qai28jerAafYApc8ZtXDUGEkLaSuOop/qgmpf+/RqPouf8tm8g+UmkeC1onCAtYm2O2BPyEhWrciZGBPAAZqA4LbgVkhEgNMnctNxW+lR/S8xQsuw8AkwJmW7JKsm478PEqZNB5h+fslRDvOaqQROzBB4mRyXlCj/0/LhoePsDAiXqiIpTN4/S0AhAfAMSHGSMesSGbMtx15sH7AJEqQSdXVHbWGzFO9pfXH79NkArtQLu8pZLxz42SqCGSaXl0X294e05o3LiSaxUYjGGhYlBiX/XDQNgcJ9fVEtVQl01w/l/E8k7fTowWM1XDPXodIR06dADBjpN/FtcEvcnJT8wi1/etN0wUX+dwSMz7UxSrJU9e265rBCos+EsXI2ZeKnnXBWp4+eUeoNoXutQKvnwMF18/Rcvcw9uJzYSGr98faXcCYAi01hdSXgS2Jh0RGoBwoQczxta7Dh8SmnAugaorCcKrfk4AOzheRcsoBzDSHFZwqVwmhKNAwhUKIzAlA2ojau359ugG8=
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DB8P189MB1032.EURP189.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(39840400004)(396003)(136003)(366004)(376002)(346002)(83730400007)(30864003)(6486002)(235185007)(478600001)(83380400001)(66616009)(66574015)(66556008)(6916009)(5660300002)(31696002)(36756003)(66946007)(86362001)(16576012)(26005)(2616005)(186003)(44832011)(16526019)(21480400003)(956004)(8676002)(966005)(316002)(2906002)(31686004)(8936002)(33964004)(66476007)(52116002)(43740500002)(45980500001); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData: =?utf-8?B?ejZwQm1xUnp3d2t0REhkZDhFUGZsVjhIWWJ0U1YzSWh2U1pxYTYvRVRJSUN4?= =?utf-8?B?dWVFTmZxQXJCY3R1ZGUzRnlmMXFycDRzZ0RCaENkZHMzdVR2d1lYSGN4OGcw?= =?utf-8?B?UkFheGJrL2pwVTllR2d4Q2ZROUxiTkZNelZGaDNtSUNiMm9BWVozU1pCazBQ?= =?utf-8?B?ZEdoS2IyTkx4cnJuZFBacFFOUVpySG14V05JZDI5T1QraExVeWt4aG5naXA5?= =?utf-8?B?R0FkYUd3dll2TFpkWnFYZ3ZTTnR0V1ZRdVpaM1ZncXo1Z2QzTzFvVU9aQ2FO?= =?utf-8?B?UWZLbng5NklGUFlsZFNja3RaL2Z0MXByQk9waGZtUGw0ZXpWVDgvaWZSMVlZ?= =?utf-8?B?T3hLenF4OWRlUUlZV2tBQ2NoWmQ0VlFqS05yNXREcTZ1dkl3Vk5MejRCMWVn?= =?utf-8?B?YVNPV0pqNmlUTERjQVhxNWJHWm9uU1h4ZU9SWi9UV21FdFBCV1pVeVJXdHZu?= =?utf-8?B?MkxTRnZ4d1N6a1hxS2JNOVg5NmZyVE5WTXY3VnZmcUYyMDc1MHQxOElpOXox?= =?utf-8?B?OGZYRkhQM1ljT1B1bmhzVHBpWmdKRTd3OVVjbWxFQXlhSndnWWdzUUVqRlNN?= =?utf-8?B?TElxTlZMUUtIZTlxWE8wUjlvNEFib2dycExucmZJaWNielZ6UHRMVDRtUEpv?= =?utf-8?B?ZnBkYitLTEJyY055ZCtGNlJUT0tDdStOdng4WVpGdG9pUkdjenVZTktSVEtX?= =?utf-8?B?eGZyQTA4ZU1KVDFmSU1xWG5sREtmTzlWbzVUNlZsOEtFUk1IS2NuT1hSemRB?= =?utf-8?B?UzhxcG5xZlNhQTZwZnhNTzdkK3JFUk1Hb2tPQ0tLU0tMTkJvUnNKRzBlVG1i?= =?utf-8?B?QmtkaWMrN3lXUkkyc2FhNGhOUnF2cUhTbGhock9qVzNsU2JGR1NYOUlKMUtE?= =?utf-8?B?L1l0K3RiZm5kUGV1T2ZOZGNyMGE3eTN1MVZ3WUZrMTNIdXhOb3NUMjViMkEy?= =?utf-8?B?N0s1UFRmVUFyc3dHLytwdDJ3OE8xNkF3aXNCT2lUZkgxaHE1TGprTGhZcDFQ?= =?utf-8?B?bDhNeGpBYi9MNXRKbEgrdlRML3p6ZXBCV1dKakw3R24vMkc1bTB5YU13ZjhU?= =?utf-8?B?TllVWmlrK0gwcXFUNStlZllndUsrSXIreEVoRU1FeVZqbElQUHArVExvYmE3?= =?utf-8?B?L3VDTmFKaGVTMCtqTFQ2S2tIOC9ndFNydGt3eFZMWHYxYzA1NjFSWmhoeDF0?= =?utf-8?B?eFBLNmVBenhQNlpOdFB4aTQ0b1dtdTFHeVNXano5aUh2QUhDd1I3ZHVJcGZU?= =?utf-8?B?WXYza3ErVi9HR1NaQzY2dEs0NTRJaVVhazdjalJadVp0WURCd0ltTGVkbFls?= =?utf-8?B?ZjZPTDdxWFM1cm9HQ2ZnU1oyNmN4Y00zWEQwWUNXU0R2T0Jzb1FsL0FqVERv?= =?utf-8?B?cThpeUtwT3Q2TitCcEFVc2huWjVhcW8xNUpkVkZVdVYzWG9MNTB4N3BQemRB?= =?utf-8?B?WWRTcE10eDBtN0FGWkYzOGE0ajRCVkhxQ0pjeXl4Vmg5Q2JzRktoQnZVVmVw?= =?utf-8?B?dERpeExsTEdZeGlqREpCSWxNRExEMzRCM0h1ZDJnSlMyRi93cm0zZzJzQU41?= =?utf-8?B?ODhuWUNrdm1RWkRwbUFjTFlkcGU1NERVY3ZtRUIzNEx2MjAzdEcwVUpQRlF4?= =?utf-8?B?VDRiVEU2SkR4eENScm4zeFcxRExMaWpWaE5wOHVLR1V4bEs5VkJvdElPalh5?= =?utf-8?B?aVZ6TTNuOC9PRExmVzRuaTN1SHE4aTZyR1F1bTRsSkcxT1NPb1NIOE4rMFNx?= =?utf-8?Q?N0LLXKZ5GfSvcIhBg0yGCpnm4So4vTO8gSQiO3u?=
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 6d4afe70-9e87-4f8f-dc6b-08d8e650790c
X-MS-Exchange-CrossTenant-AuthSource: DB8P189MB1032.EURP189.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 13 Mar 2021 18:47:37.7534 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: gycScLm7qVHsvmgL0HWaK9gv0KdEsIwgffsvg3wpem3JWiRahZ4Z5G/DXOyxmq7+xZZJuiu044QNCeh8AOl9IA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9P189MB1596
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/ZYCR84mPrAvGFFIw_efP6ZnTYjM>
Subject: [core] CoRE @ IETF 110 - Minutes and summary
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Mar 2021 18:47:47 -0000

Dear all,

The minutes for the two CoRE sessions are available at [1]. Thanks a lot 
to the note takers Michael Richardson, Göran Selander and Rikard Höglund!

Please, send possible fixes and updates to core-chairs@ietf.org or to 
the mailing list, preferably within the next 7 days.

The recordings of the two CoRE sessions are available at [2][3].

Finally, you can find below the usual summary of the two sessions, with 
fewer technical details. This summary is also available at [4].

Thank you all for your participation and contribution!

Best,
Marco and Jaime


[1] https://datatracker.ietf.org/meeting/110/session/core

[2] https://www.youtube.com/watch?v=GteEGOyW5JI

[3] https://www.youtube.com/watch?v=VKhUnOji8XA

[4] 
https://github.com/core-wg/wg-materials/blob/master/ietf110/core-110-summary.md

----------

# Summary

## WG and document status

Carsten Bormann standing in as chair for Jaime during IETF 110.

Thanks to Barry Leiba as outgoing AD, welcome to Francesca Palombini as 
new AD.

* Published
     * RFC 8974 (was draft-ietf-core-stateless)

* RFC Editor Queue
     * draft-ietf-core-dev-urn-11

* IESG Processing:
     * draft-ietf-core-resource-directory-28: Approved-Announcement Sent
     * draft-ietf-core-echo-request-tag-12: Approved-Announcement to be 
Sent::Revised ID Needed

* In Last Call
     * draft-ietf-core-yang-cbor-15:  In Last Call, until 2021-03-17
     * draft-ietf-core-sid-15:  In Last Call, until 2021-03-17

* In Post-WGLC processing:
     * draft-ietf-core-yang-library-03: waiting for shepherd write-up
     * draft-ietf-core-comi-11: waiting for shepherd write-up
     * draft-ietf-core-oscore-groupcomm-11: processed WGLC comments and 
one more review; ongoing work on open points
     * draft-ietf-core-senml-data-ct-03: processed WGLC comments; synch 
with draft-bormann-core-media-content-type-format
     * draft-ietf-core-new-block-07: processed WGLC comments

## Groupcomm-bis

* draft-ietf-core-groupcomm-bis-03

Latest updates include: support for reverse proxies; caching of 
responses, with two types of cache entries at the proxy; a response 
validation model between client and servers with a new Multi-ETag 
option, and between client and proxy with a new Group-ETag option. 
Cacheability with end-to-end security is still possible using the 
deterministic requests of draft-amsuess-core-cachable-oscore.

It is preferable to move the new part on response validation to a 
different document, e.g. draft-tiloca-core-groupcomm-proxy. Next steps 
are about addressing open Github issues; moving some content to the 
rights places / different documents; implements aspects involving e.g. 
observe and blockwise.

## Group OSCORE

* draft-ietf-core-oscore-groupcomm-11

Latest updates addressed points raised at IETF 110 and from Christian's 
review at

https://mailarchive.ietf.org/arch/msg/core/pXEyxhbf-s2wgGDzrDhUNPsHZZc/

Two main open points remain.

1. Admit the recycling of Group IDs, as currently forbidden to avoid 
problems with long-living observations. This can rely on the Group 
Manager storing for each group member the GID used in the group when 
that member joined, and adapting group rekeying processes accordingly. 
No objection to this update.

2. Related to Github issues #72 and #73, on using the same identity key 
for both signing and Diffie-Hellman key derivation for the pairwise 
mode. Not really a common practice, need to be proven secure. Point 
originally raised by Ben Kaduk

https://mailarchive.ietf.org/arch/msg/core/ujj_I-LlqW9fq__quh-YqKS0fF0/

    There's a pre-print in progress, to prove that the approach is 
secure, possibly after minor changes to the exact key derivation steps. 
A less preferable alternative is to have storage and provisioning of 
separate signing and Diffie-Hellman keys. More on this point in the next 
months.

Plan for v -12 is to address the two open points above. That should be a 
stable version, there are no other known issues.

## OSCORE Group Discovery

* draft-tiloca-core-oscore-discovery-08

This method uses the Resource Directory to discover links to an OSCORE 
group manager, hence to discover OSCORE groups and how to join them. The 
latest updates include information on the pairwise mode of Group OSCORE; 
consider also the signature verifier as possible client; revise the 
examples.

Marco's implementation has been tested against Christian's RD, covering 
all the steps defined in the draft.

https://bitbucket.org/marco-tiloca-sics/ace-java/src/master/src/test/java/se/sics/ace/interopGroupOSCORE/CoAPEndpointToResourceDirectory.java

coap://rd.coap.amsuess.com

The next version will have more security considerations and will align 
with latest additions to the RD document. Plan to integrate the 
individually implemented steps into the actual joining node and Group 
Manager. The document needs reviews.

## Multicast Notifications

* draft-tiloca-core-observe-multicast-notifications-05

This method enables a server to send multicast notifications to a group 
of clients. Possible to also use Group OSCORE. The server sends a 
phantom observation request to itself; observe notifications are 
responses to that request.

This version has a new encoding for informative error responses to the 
clients; a new encoding for expressing addressing information in the 
informative responses; optimization for a server self-managing its 
OSCORE group and for having the phantom request as a deterministic 
request (see 
https://datatracker.ietf.org/doc/draft-amsuess-core-cachable-oscore/). 
Next steps include considering also reverse proxies and deterministic 
requests used together with proxies. All main components are already in 
place.

In-room consensus for adoption: +13 in favor, no objections. To be 
confirmed on the mailing list.

Will review: Esko, Göran

Planned implementations: Christian, Marco

## Groupcomm proxy

* draft-tiloca-core-groupcomm-proxy-03

    - Discuss updates and open points

The document describes a signaling protocol with two new CoAP options, 
to enable proxies in group communication.

This last version has especially revised the encoding of server's 
addressing information conveyed in one of the options; and has added 
also support for reverse proxies (with two examples).

Appendix A defines "OSCORE in OSCORE" as useful here for the proxy 
authenticating the client before forwarding, but it is actually 
forbidden by RFC 8613. Now we have use cases for it, but it would 
require proper definition, analysis and update of RFC 8613.

Support to move out "OSCORE in OSCORE" and have it in a separate 
dedicated document. Possible collision of identifiers would be possible 
to address leveraging differences in transport information.

Next steps are about addressing raised points raised and covering the 
case where client and cross-proxy talk HTTP.

Earlier promised reviews: Christian and Carsten.

## Cacheable OSCORE

* draft-amsuess-core-cachable-oscore-01

This method enables caching of OSCORE-protected responses; all group 
members can act as a deterministic client with a well-known Sender ID 
and Sender Key. The exact encryption key is derived for each different 
request. The key derivation process is similar to the one in the 
pairwise mode of Group OSCORE. One trades some security properties with 
enabling cacheability. This also improves the way things work in 
https://datatracker.ietf.org/doc/draft-tiloca-core-observe-multicast-notifications/

During the hackathon, Marco and Christian interoped and decrypted each 
others' deterministic requests. Finding from the hackathon improved some 
design aspects, already in the editor's copy.

Next steps are more interop, process the feedback and then go for a 
proper review with security in mind.

## OSCORE with EDHOC

* draft-palombini-core-oscore-edhoc-02

This method combines the last EDHOC message to establish an OSCORE 
security context together with the first CoAP request protected with 
that OSCORE context.

The last version has determined one specific approach based on a new 
EDHOC option with zero-length; and added an optimization, i.e. only part 
of the EDHOC message goes on the wire, while the rest can be 
reconstructed by the server, saving at least 2-4 bytes.

Next will be to keep this in synch with the main EDHOC document; some 
specific point can better fit in this document.

In-room consensus for adoption: +9 in favor, one "not raise hand" (not 
against, but not sure either), no objection. To be confirmed on the 
mailing list.

## AEAD limits in OSCORE

* draft-hoeglund-core-oscore-key-limits-00

This considers the AEAD cipher limits defined in 
https://datatracker.ietf.org/doc/draft-irtf-cfrg-aead-limits/ , and 
defines additional actions for OSCORE. Need to count key usages and 
renew the OSCORE context of the two peers when a limit is passed. One 
limit 'q' is about performed encryptions with a key, while 'v' is about 
failed decryptions using a key. Plan to cover more algorithms than CCM_8 
and give optimizations for constrained devices and implementation 
guidelines.

* https://mailarchive.ietf.org/arch/msg/core/h5JHgX5wTBkJtrKl_ezswiCdUBI/

The above is important to happen in OSCORE. Renewing the security 
context might also be useful to do for other reasons like for 
counteracting key compromise, especially if the rekeying provides 
perfect forward secrecy.

The original procedure used to compute the limit considers arbitrary 
assumptions that yield the actual limits now considered in the draft. 
It's also unfair to some particular algorithms. It would be good to have 
an overall revision of that procedure. OSCORE in particular may consider 
more appropriate values.

The possible revision of the procedure belongs to somewhere else; the 
document above can still recommend better values to use, with some short 
explanations.

## CORECONF Comi

* draft-ietf-core-comi-11

The CORECONF documents core-sid and core-yang-cbor are in last call. Got 
comments for core-sid on the intentional creation of a new global naming 
system; good to get views from the security community.

For core-comi issues came up during the shepherd write-up preparation: 
from netmod on incompatibility between uint8 and int8; string that may 
not be URL-safe; definition of "CBOR key"; key vs. CBORencode(key). Also 
required for minor clarifications when using blockwise transfers and 
pagination, and about leading zeros in base64 encoding of SID numbers.

A revised version is needed as addressing these points. Changes to the 
above encoding should not be an issue for implementations.

Then to be checked if a new Working Group Last Call is needed.

## SenML Versions

* draft-ietf-core-senml-versions-02

This version addresses comments from Jaime (e.g. approach to bitmapping 
a number). Ari added to his SenML validator the bit for additional 
units. Ready to move on.

We will start a Working Group last call.

## SenML Data CT

* draft-ietf-core-senml-data-ct-03

This version provides editorial clarifications and decompression bomb 
security consideration.

Still having a normative reference to 
draft-bormann-core-media-content-type-format (MCTF), which seems to 
require some time to become an adopted document, based on the Monday 
discussion in DISPATCH.

Proposed to remove MCTF as normative reference, and include into 
senml-data-ct only the minimal set of things needed from MCTF.

This seems good and straightforward, but better to first wait for more 
discussion in DISPATCH before deciding. The two documents can anyway 
separately proceed in parallel.

Next step is to have a a Pull Request on the senml-data-ct document to 
gain time and be ready to take the new direction.

## New Block

* draft-ietf-core-new-block-07

Addressed WGLC comments and further follow-up comments from Christian. 
Other than technical refinements, this version provides better 
clarifications on being specific for the DOTS use case.

Available implementation based on libcoap, to which a PR has been 
submitted. Has been tested in DOTS environment and behaving as expected.

Reviewers largely happy with the current version. This can be seminal 
material for a possible blockwise-bis.

The document will move forward; Marco will be shepherd and start the 
shepherd review and write-up soon.

## Dynlink

* draft-ietf-core-dynlink-13

This version incorporates latest feedback also based on discussion at 
the latest interim.

The Conditional Attributes have been separated into Conditional 
Notification Attributes and Conditional Control Attributes. New 
attributes "edge" and "con" have also been added.

Required harmonization for the use of the attributes "band" and "con", 
having in mind the use that LwM2M does of the defined parameters.

http://www.openmobilealliance.org/release/LightweightM2M/V1_2-20201110-A/HTML-Version/OMA-TS-LightweightM2M_Core-V1_2-20201110-A.html#Table-512-2-lessNOTIFICATIONgreater-class-Attributes

The first part, about the parameters, is pretty mature now. The second 
part on the dynamic link concept needs more discussion and work. The two 
parts are independent.

Agreement in the group to split the current document into two different 
documents about the two different parts above. The dynlink document will 
be the one focused on the link material.

Work is needed also on covering a case with proxies, looking at 
interactions as end-to-end or hop-by-hop. So far the hop-by-hop approach 
has been privileged. In either case, the impact of possibly present 
proxies has to be considered.

## RD extensions and protocol negotiations

* draft-amsuess-core-resource-directory-extensions-05

* draft-amsuess-core-transport-indication-00

The first document defines RD extensions as to what you can do with the 
RD without changing the spec. This includes the reverse proxy extension, 
for asking the RD to provide a publicly reachable name and act as a 
reverse proxy. Often used (also during the IETF 110 hackathon); most of 
LWM2M uses a similar mechanism. The RD may also partially partner with a 
proxy.

The undesirable side effect is URI aliasing, which can be avoided if 
devices use the RD only as proxy. Similar problem in protocol 
negotiation case, coap+tcp:// and coap:// both collapse to a same resource.

To avoid that, the second document suggests an approach for proxy 
discovery. A server announces that it has a proxy at a location, by 
using link-relations. Everything hosted on this host is reachable via a 
specific proxy. No URI aliasing in the application (possibly only on the 
wire).

Next steps are to gather feedback, tuning relations, and update the RD 
extensions to show how it can be used. Some security considerations can 
be further elaborated by building on some from the HTTP working group.

## A Data-centric Deployment Option for CoAP

* draft-gundogan-core-icncoap-00

This draws parallels between ICN and CoAP deployments, already shared 
with the ICN community. ICN allows not specifying a server endpoint, but 
rather focuses on content delivery, using name-based stateful forwarding 
and content caching.

Possible to use object security end-to-end protection (also to cached 
content); all hops on the path creates state, which is consumed when a 
response traverses back. This can also prevent traffic amplification 
(DDOS). Caching is hop-wise, so retransmission can originate from any 
intermediate entity in the path, which reduces link traversals.

Tried already with OSCORE, using cacheable OSCORE, see 
https://datatracker.ietf.org/doc/draft-amsuess-core-cachable-oscore/. It 
worked quite good, with improvement of success rates in lossy network.

A related paper from 2020 considers a CoAP deployment similar to an ICN 
deployment using only standard CoAP features.

Most ICN systems support multiparty communication (mostly using request 
aggregation and response fan-out, or request fan-out and response 
deduplication). Ongoing work to provide more results with multi-party 
communication. Future work to allow dynamic proxy discovery. The 
Resource Directory can help to discover links and as announcement point 
for routes (especially to a particular good next-hop proxy).

This is an unconventional way of deploying CoAP but worth exploring in 
CoRE; it's not out of scope. It can also be discussed in T2TRG.

Since firmware update is a good use case, also the SUIT Working Group 
can be interested. This approach allows to retrieve an update from the 
closest location, rather than always from a certain update server.

For the multi-party case, there are building blocks for this too as work 
in progress in CoRE.


-- 
Marco Tiloca
Ph.D., Senior Researcher

RISE Research Institutes of Sweden
Division ICT
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501
https://www.ri.se