Re: [core] Artart last call review of draft-ietf-core-oscore-edhoc-09

Marco Tiloca <marco.tiloca@ri.se> Thu, 23 November 2023 15:45 UTC

Return-Path: <marco.tiloca@ri.se>
X-Original-To: core@ietfa.amsl.com
Delivered-To: core@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 887E3C14CE2F; Thu, 23 Nov 2023 07:45:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.106
X-Spam-Level:
X-Spam-Status: No, score=-2.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ri.se
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qyO44JXAY7Sa; Thu, 23 Nov 2023 07:45:24 -0800 (PST)
Received: from GVYP280CU001.outbound.protection.outlook.com (mail-swedencentralazon11012009.outbound.protection.outlook.com [52.101.82.9]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D095C14CF1E; Thu, 23 Nov 2023 07:45:23 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FK1RHA58yZUy2gdoPGfkbNnN9UmFjiaq3KZOvRFc7jrdkoIjBjnHzhKXB5qNlY75mlz+QmDDjYxcMcDpRXUkYaRJyITJwapqupawPSaLf0DZnOcMtgKYd0C7mfakNBAcsiJ5kdncNAKrv1K6UMnIdXphFg72nHQt/6VpKWVyj1ca+sFshZp9KHqChKY9WyM2Vp1++sfvOk1hCDwLBxBgKO674z2bk4ZnXyTT2KnFMS9ZKX3oPSmub0oqMCJGfgRDl/aLg6d8eXYHeCKY5rtIdmsejYOtEBmRxt2e1I6FsfJGkPoMxLPSS8gyfVkxcIB4W1F+daxM9G9kwZT0qbczHQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2b50JG42q1mbrKWZ4E1g3hEScVSxQ7gDXqSKB2Nzg7Q=; b=GDgLcGr9D+apCK/ZZLaWPXGbj8IxzFM9GfHtMKzgJCE1x02pxYcTSK7IUP/N5ygPKoLXXL7+9mT6pkgiVtioiCKo7bcPewMPiydSbbbkclL845/y2xjZILbpDNU37EsC6KzlWHMbD3KPy5dA9ypaT6fb9y69xfat1NbMEcqQ6PasbKnBjKUSzt5NKbQ5SBCGBYrps5/fSMrFMxILQEcLs3EdKxY4W3hrvqiI/tVUmIEB4BRIWxcrYqmSWyJeGrIed0S8FrFgfO9dGghjVS0Q6TF3tU64Audsnelox+wxe0L9tK8l5w2NRbKIlDWM8WJhRS+DRnz5yA2UnvnrzEPdbw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2b50JG42q1mbrKWZ4E1g3hEScVSxQ7gDXqSKB2Nzg7Q=; b=Fg0QJH47tNA8rE70hCfCL40mV51Py/zhNBX0BYWlGSr6Rm4ks0VM2P/X4oZkaSW7BxfLNQ+TIdZ/9O7hIsVpbWHwAsYOPb2I25FCt0rwaHkIzNBUCGnKpGPKvsSVqseTMxeXpGv32LSb9aBFLhCU6b2lqGt53RF+jwGyRQgVp/M=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by GV3P280MB0795.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:f1::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7025.21; Thu, 23 Nov 2023 15:45:20 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::49f4:9d27:4b68:cdab]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::49f4:9d27:4b68:cdab%4]) with mapi id 15.20.7025.021; Thu, 23 Nov 2023 15:45:20 +0000
Message-ID: <c5de1d9c-0a47-4ca5-818e-47c0668ffc1a@ri.se>
Date: Thu, 23 Nov 2023 16:45:18 +0100
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: Shuping Peng <pengshuping@huawei.com>, art@ietf.org
Cc: core@ietf.org, draft-ietf-core-oscore-edhoc.all@ietf.org, last-call@ietf.org
References: <169995403049.46907.612833618941949882@ietfa.amsl.com>
From: Marco Tiloca <marco.tiloca@ri.se>
Autocrypt: addr=marco.tiloca@ri.se; keydata= xsBNBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLNR8ZhDz6Z aRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD+QBdf29pQadrVZAt 0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGNdsY6kPSVzMRyedX7ArLXyF+0 Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZXkLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+ NrSetJlljT0QOXrXMGh98GLfNnLAl6gJryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEB AAHNNk1hcmNvIFRpbG9jYSAobWFyY28udGlsb2NhQHJpLnNlKSA8bWFyY28udGlsb2NhQHJp LnNlPsLAdwQTAQgAIQUCWkAnkAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDuJmS0 DljaQwEvCACJKPJIPGH0oGnLJY4G1I2DgNiyVKt1H4kkc/eT8Bz9OSbAxgZo3Jky382e4Dba ayWrQRFen0aLSFuzbU4BX4O/YRSaIqUO3KwUNO1iTC65OHz0XirGohPUOsc0SEMtpm+4zfYG 7G8p35MK0h9gpwgGMG0j0mZX4RDjuywC88i1VxCwMWGaZRlUrPXkC3nqDDRcPtuEGpncWhAV Qt2ZqeyITv9KCUmDntmXLPe6vEXtOfI9Z3HeqeI8OkGwXpotVobgLa/mVmFj6EALDzj7HC2u tfgxECBJddmcDInrvGgTkZtXEVbyLQuiK20lJmYnmPWN8DXaVVaQ4XP/lXUrzoEzzsBNBFSN eRUBCACWmp+k6LkY4/ey7eA7umYVc22iyVqAEXmywDYzEjewYwRcjTrH/Nx1EqwjIDuW+BBE oMLRZOHCgmjo6HRmWIutcYVCt9ieokultkor9BBoQVPiI+Tp51Op02ifkGcrEQNZi7q3fmOt hFZwZ6NJnUbA2bycaKZ8oClvDCQj6AjEydBPnS73UaEoDsqsGVjZwChfOMg5OyFm90QjpIw8 m0uDVcCzKKfxq3T/z7tyRgucIUe84EzBuuJBESEjK/hF0nR2LDh1ShD29FWrFZSNVVCVu1UY ZLAayf8oKKHHpM+whfjEYO4XsDpV4zQ15A+D15HRiHR6Adf4PDtPM1DCwggjABEBAAHCwF8E GAECAAkFAlSNeRUCGwwACgkQ7iZktA5Y2kPGEwf/WNjTy3z74vLmHycVsFXXoQ8W1+858mRy Ad0a8JYzY3xB7CVtqI3Hy894Qcw4H6G799A1OL9B1EeA8Yj3aOz0NbUyf5GW+iotr3h8+KIC OYZ34/BQaOLzdvDNmRoGHn+NeTzhF7eSeiPKi2jex+NVodhjOVGXw8EhYGkeZLvynHEboiLM 4TbyPbVR9HsdVqKGVTDxKSE3namo3kvtY6syRFIiUz5WzJfYAuqbt6m3TxDEb8sA9pzaLuhm fnJRc12H5NVZEZmE/EkJFTlkP4wnZyOSf/r2/Vd0iHauBwv57cpY6HFFMe7rvK4s7ME5zctO Ely5C6NCu1ZaNtdUuqDSPA==
In-Reply-To: <169995403049.46907.612833618941949882@ietfa.amsl.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------zA3obcBDk00Sh0aCSVF0nJFg"
X-ClientProxiedBy: GV3PEPF00002BBC.SWEP280.PROD.OUTLOOK.COM (2603:10a6:144:1:0:6:0:16) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|GV3P280MB0795:EE_
X-MS-Office365-Filtering-Correlation-Id: 8f096f89-a250-4a09-fbf6-08dbec3b3291
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: R+lbzNMvqbS4A00nXNth5XI6oDFTqduE2+6cgNBYMXn5xEKSd962DRrscw4TcqhVG62gqZ/cgyONvKzewgPGydMfjp79ZNfXMccFYRrRslHZGAQdWoGf/CfK+XRqqR5qGDQ+yWfMYOuW+bK8CPPCPaadg2kAXaBJPbrOGDiq6ZGF68qAJR2F9xjU/UH24914c0g9VwTtgaxP27xoNGZ8r93kVMRMc0O2CEQCyN7wT+fNyzv/vn8HkByhZ+PqXHpsYEU1do9T4Or/LMJ5a9WsiyrlLQmLVpE+ZwANwM6ZQ7nmhcEmZ6eiiOzddbMZXx+tPBqS0stHfkn1zyeQWXIMTdE6eJpmo4OP9gB0HDfTMKPrTnh3lG4wlVSG+5mR8OCgssGtytpjn6mPeK1wTAZvg1G3FbrEdz4w5ECxqsj177Z5ApIBg6akSqUrI85WN131JjSEggGa9XxuaHyqX+erooCgDpLwwaMTI9jtIiKoafcE42XZxrFvm6qB5ptv0gKwEmkq8G3NO/PLFhJONhDqkfd2s2LLKxNUcHCkV104Oj9nA18afSjR9NCZheDIQcpt9Wuw7YI2AzQO2Jr/S82FjUwSmKgD0VtNN1Qm7mOBAm+3pZvfyCvTt5V/CvrUxircUJGCiZul6/Vad1/LDqP1vN6TC5gv1yYTVOeoGGnhoHaNLL4Ljs4FfKUeTAnw2Dpp
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(366004)(376002)(346002)(136003)(39860400002)(396003)(230273577357003)(230922051799003)(230173577357003)(186009)(1800799012)(451199024)(64100799003)(4001150100001)(44832011)(235185007)(5660300002)(4326008)(8936002)(8676002)(2906002)(31686004)(30864003)(41300700001)(316002)(66476007)(66556008)(66946007)(86362001)(966005)(478600001)(2616005)(6506007)(36756003)(6512007)(53546011)(33964004)(26005)(166002)(83380400001)(21480400003)(6486002)(38100700002)(31696002)(45980500001)(43740500002); DIR:OUT; SFP:1101;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: 8f096f89-a250-4a09-fbf6-08dbec3b3291
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Nov 2023 15:45:20.0013 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: 00Qpmxr3t0s4PVNqVWsecCuf6vhChNh+b9q/T95pfUN+Z8xCQ7ljCPe4OUXCYjVGafnvHFB3CJ5clm4S+WwXMg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: GV3P280MB0795
Archived-At: <https://mailarchive.ietf.org/arch/msg/core/x9zKCmd73-u786vgU0cEQANtVYo>
Subject: Re: [core] Artart last call review of draft-ietf-core-oscore-edhoc-09
X-BeenThere: core@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Constrained RESTful Environments \(CoRE\) Working Group list" <core.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/core>, <mailto:core-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/core/>
List-Post: <mailto:core@ietf.org>
List-Help: <mailto:core-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/core>, <mailto:core-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Nov 2023 15:45:28 -0000

Hello Shuping,

Thanks a lot for your review! Please find in line below our detailed 
replies to your comments.

A Github PR where we have addressed your comments is available at 
[ARTART-PR].

Unless any concern is raised, we plan to soon merge this PR (and the 
other ones related to other received reviews), and to submit the result 
as version -10 of the document.

Thanks,
/Marco

[ARTART-PR] https://github.com/core-wg/oscore-edhoc/pull/17


On 2023-11-14 10:27, Shuping Peng via Datatracker wrote:
> Reviewer: Shuping Peng
> Review result: Ready with Issues
>
> I am the assigned ART-ART reviewer for this draft.
>
> Summary:
> I have some minor concerns about this document that I think should be resolved
> before publication.
>
> Comments:
> I think this document is basically ready for publication.
>
> Major Issues:
> "No major issues found."
>
> Minor Issues:
> Where the "C_R" is actually carried is not clear. It would be good if the
> following text in Section 3 could be more clear about it, and it might also be
> helpful to show the "C_R" in Figure 2. "     EDHOC data consisting of the pair
> (C_R, EDHOC message_3) required
>        for completing the EDHOC session.  Note that, as specified in
>        Section 3.2, C_R is transported in the OSCORE Option of the OSCORE
>        Request rather than in the CoAP payload of the EDHOC + OSCORE
>        request.
> "

==>MT

In order to clarify where C_R is transported, we have made the following 
changes.

In Section 3.0, we have revised the bullet list introduced by "That is, 
the EDHOC + OSCORE request ..." to become as follows.

 > That is, the EDHOC + OSCORE request is composed of the following two 
parts combined together in a single CoAP message:
 >
 > * The OSCORE Request from Figure 1, which is also in this case sent 
to a protected resource, with the correct CoAP method and options 
intended for accessing that resource.
 >
 > * EDHOC data consisting of the pair (C_R, EDHOC message_3) required 
for completing the EDHOC session, transported as follows:
 >    * C_R is the OSCORE Sender ID of the client and hence transported 
in the 'kid' field of the OSCORE Option (see Section 6.1 of RFC 8613). 
Unlike in the sequential workflow shown in Figure 1, C_R is thus not 
transported in the payload of the EDHOC + OSCORE request.
 >    * EDHOC message_3 is transported in the payload of the EDHOC + 
OSCORE request, prepended to the payload of the OSCORE Request. This is 
because EDHOC message_3 may be too large to be included in a CoAP 
Option, e.g., when conveying a large public key certificate chain as 
ID_CRED_I (see Section 3.5.3 of [I-D.ietf-lake-edhoc]) or when conveying 
large External Authorization Data as EAD_3 (see Section 3.8 of 
[I-D.ietf-lake-edhoc]).

Also in Section 3.0, we have updated Figure 2 to show the inclusion of 
C_R in the CoAP OSCORE Option of the EDHOC + OSCORE request. That is:

OLD
```
        | -------------- EDHOC + OSCORE Request ------------> |
        |   Header: 0.02 (POST)                               |
        |   Payload: EDHOC message_3 + OSCORE-protected data  |

        ~snip

        | <--------------- OSCORE Response ------------------ |
        |                    Header: 2.04 (Changed)           |
        |                    Payload: OSCORE-protected data   |

```

NEW
```
        | -------------- EDHOC + OSCORE Request ------------> |
        |   Header: 0.02 (POST)                               |
        |   OSCORE: { ... ; kid: C_R }                        |
        |   Payload: EDHOC message_3 + OSCORE-protected data  |


        ~snip

        | <--------------- OSCORE Response ------------------ |
        |                    Header: 2.04 (Changed)           |
        |                    OSCORE: { ... }                  |
        |                    Payload: OSCORE-protected data   |
```

In Section 2, we have similarly updated Figure 1 to show the inclusion 
of C_R in the CoAP OSCORE Option of the OSCORE request. That is:

OLD
```
        | ---------------- OSCORE Request -----------------> |
        |   Header: 0.02 (POST)                              |
        |   Payload: OSCORE-protected data                   |

        ~ snip

        | <--------------- OSCORE Response ----------------- |
        |                 Header: 2.04 (Changed)             |
        |                 Payload: OSCORE-protected data     |
```

NEW
```
        | ---------------- OSCORE Request -----------------> |
        |   Header: 0.02 (POST)                              |
        |   OSCORE: { ... ; kid: C_R }                       |
        |   Payload: OSCORE-protected data                   |

        ~ snip

        | <--------------- OSCORE Response ----------------- |
        |                 Header: 2.04 (Changed)             |
        |                 OSCORE: { ... }                    |
        |                 Payload: OSCORE-protected data     |
```

Also in Section 2, we have extended the ninth paragraph as follows:

OLD
 > After this exchange takes place, and after successful verifications 
as specified in the EDHOC protocol, the client and server can derive an 
OSCORE Security Context, as defined in Appendix A.1 of 
[I-D.ietf-lake-edhoc]. After that, they can use OSCORE to protect their 
communications as per [RFC8613].

NEW
 > After this exchange takes place, and after successful verifications 
as specified in the EDHOC protocol, the client and server can derive an 
OSCORE Security Context, as defined in Appendix A.1 of 
[I-D.ietf-lake-edhoc]. After that, they can use OSCORE to protect their 
communications as per [RFC8613]. Note that the EDHOC Connection 
Identifier C_R is used as the OSCORE Sender ID of the client (see 
Appendix A.1 of [I-D.ietf-lake-edhoc]). Therefore, C_R is transported in 
the 'kid' field of the OSCORE Option of the OSCORE Request (see Section 
6.1 of RFC 8613).

<==

>
>

-- 
Marco Tiloca
Ph.D., Senior Researcher

Phone: +46 (0)70 60 46 501

RISE Research Institutes of Sweden AB
Box 1263
164 29 Kista (Sweden)

Division: Digital Systems
Department: Computer Science
Unit: Cybersecurity

https://www.ri.se