Re: [Gen-art] Gen-ART Last Call review of draft-ietf-ace-dtls-authorize-12

Göran Selander <goran.selander@ericsson.com> Fri, 25 September 2020 15:07 UTC

Return-Path: <goran.selander@ericsson.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F8B23A0EAD; Fri, 25 Sep 2020 08:07:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.796
X-Spam-Level:
X-Spam-Status: No, score=-3.796 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-1.695, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mi9zcJ6p9KPc; Fri, 25 Sep 2020 08:07:50 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2049.outbound.protection.outlook.com [40.107.22.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0CF913A0E41; Fri, 25 Sep 2020 08:07:49 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cAW9OpEDzCEvkiYII7GWmJtLo3coPTK/LuA4gSRADan2DRWI39P1UBSHKUaR9B8vf915qstsRBDfekMtVpO9IoqBUodMdj+elk95CnWrPIbsn3lJcOX2/QGLzRMoCkEKGvoRYdf3cEh/4zlXIMEA+9YQqRtJ3g6d/fVEM8IopB14Asy5A2mdnIt9J6US7jYJZJgQqLU7KR0ODTSh8K5N6bLxczZfxKbG4nvi4XHJ5zgnj1wU3CFl6HMd5qRYpnlhkc6Lg+2W2YDY20vVDSOKGKmF6Ctje/NleVhIm+fNYGwJ+qGblyaVw5jnn7+ycAaaU/lYgqm9/yzmDcZJnlHS4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jZ1YqPE/rn14efFQmn+t4yMR3l6GvntfiFbcFCvFljU=; b=k021i2vomWLmG3FqLaVn2nS549s4WJIGHXtH4fU6WoVz94WwwJpFcelhV6xQ88EfX/+/ybXQZvcb5MPR3G85ztRtNL7Klf40Yi9ZO8hInG4rftWFZ0FfNZi0Kyq6ZspmpKCzAOvmcxDLG7u1FYJEkAteFx/l5HuUP6PWR1BnGyHOfZKd7aAXFoGmyo+hwITFFDYiPuFD07G6X21w4LqAM8csuPKlnHACCKjrq2qA0Jz8x7QTqaf6rF3MnV5+r5S6TmVPb3u7uNXkiIBKAnHq2As47mq9Qv+BcJPiEMWhNKUa7nz9lCivVZR6uiIU/hGgn1Kc56XG7d0HkAIAmSp0bw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jZ1YqPE/rn14efFQmn+t4yMR3l6GvntfiFbcFCvFljU=; b=THr+Rh7LayBU8IJKbGz2l6QusSDDbSflf0VEfAZXA99z0jZ9QlxX9PT+W33wZzvZmsKxRmKUtTx2G2WzX4b26U/7PBJBllBgeKYNKXrlwKf42jiw3Egxxz5etKUIIphlODtapPFdjhK5dhQ/7QkBaBwv4Z81jrVvIOUaGHENLbU=
Received: from HE1PR0702MB3674.eurprd07.prod.outlook.com (2603:10a6:7:82::14) by HE1PR0701MB2217.eurprd07.prod.outlook.com (2603:10a6:3:29::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3433.14; Fri, 25 Sep 2020 15:07:47 +0000
Received: from HE1PR0702MB3674.eurprd07.prod.outlook.com ([fe80::f5ce:b24:f47e:799c]) by HE1PR0702MB3674.eurprd07.prod.outlook.com ([fe80::f5ce:b24:f47e:799c%4]) with mapi id 15.20.3433.013; Fri, 25 Sep 2020 15:07:47 +0000
From: Göran Selander <goran.selander@ericsson.com>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>, Olaf Bergmann <bergmann@tzi.org>
CC: "draft-ietf-ace-dtls-authorize.all@ietf.org" <draft-ietf-ace-dtls-authorize.all@ietf.org>, General Area Review Team <gen-art@ietf.org>
Thread-Topic: Gen-ART Last Call review of draft-ietf-ace-dtls-authorize-12
Thread-Index: AQHWXgqKUNF5KYj7Y0KijsQy9TxCz6koEzbrgDbTRl2ABVdjgIAImc7MgAB56YCADK8bAA==
Date: Fri, 25 Sep 2020 15:07:47 +0000
Message-ID: <BBE7312D-0581-47A6-BA0D-BC7E5093F67C@ericsson.com>
References: <8c2725a3-f89f-7ea1-dda9-681edd463a32@alum.mit.edu> <87y2muo6ix.fsf@wangari> <87v9gomsf4.fsf@wangari> <b0e2088b-ab24-3d35-c98a-161955d3fc7a@alum.mit.edu> <87v9gcg6za.fsf@wangari> <b8a6b44d-ff4d-448c-6ca0-779cb98187c5@alum.mit.edu>
In-Reply-To: <b8a6b44d-ff4d-448c-6ca0-779cb98187c5@alum.mit.edu>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.41.20091302
authentication-results: alum.mit.edu; dkim=none (message not signed) header.d=none;alum.mit.edu; dmarc=none action=none header.from=ericsson.com;
x-originating-ip: [83.251.145.232]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: e7d895f3-ca3e-495b-04d1-08d86164c353
x-ms-traffictypediagnostic: HE1PR0701MB2217:
x-microsoft-antispam-prvs: <HE1PR0701MB2217F6A3D4F197F5F1CEF6F2F4360@HE1PR0701MB2217.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: n5l6g8szzYj8Y7yZtCkQPzpOHFDuVoBZteh5kz2U7cjQuQI28wRXcRQcTQbu5oyXoeOMD2wLcio5A0RlSl1YTvv6OOujw4te4YE4NQEwAoYDauBC/1CJnEVWH5uv43P2YOdENhjv/dqQAcx015pML53xGbha+mp0DnDGuPrmlCZDJcoU1zwMuXxSoed4U3J276BCkTPgRH7GUDGTR7jlrpBk8cvf0BQG8V/fbaSpl4KLK5vMQB1W2914jPo+3HlrfqBGRoCsGcTS9MlQ2gz4fJnZpFVKGvRD56FhN+OMpjUS7IEI85xCrsxwQYd8MGnY6VgsUy6yDPxkMTqzFuFIGg==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR0702MB3674.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(346002)(376002)(396003)(136003)(39860400002)(6486002)(66946007)(66476007)(64756008)(66446008)(66556008)(91956017)(54906003)(33656002)(76116006)(85182001)(71200400001)(110136005)(5660300002)(86362001)(316002)(36756003)(2616005)(85202003)(186003)(6512007)(26005)(6506007)(53546011)(66574015)(8936002)(83380400001)(478600001)(8676002)(2906002)(4326008); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <74F0DBA30B3A2D418F97ED052233AB60@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR0702MB3674.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: e7d895f3-ca3e-495b-04d1-08d86164c353
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Sep 2020 15:07:47.3297 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xngsd5c9pefKGp53r73itKChlwmkD4j6tdjO8xlsbYuR7ejAAMv6r8BWW5eZI9/yxqONQF03eimKIzizxbI0E7eTD4heIeahpt3zofInuY0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0701MB2217
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/_5mkTRa9w8MlJGSdTnA_RHXW76M>
Subject: Re: [Gen-art] Gen-ART Last Call review of draft-ietf-ace-dtls-authorize-12
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 25 Sep 2020 15:07:54 -0000

Hi Paul,

On 2020-09-17, 17:26, "Paul Kyzivat" <pkyzivat@alum.mit.edu> wrote:

    Hi Olaf,

    On 9/17/20 4:09 AM, Olaf Bergmann wrote:
    > Hi Paul,
    > 
    > Responding to you remaining comments please see inline.
    > 
    > Paul Kyzivat <pkyzivat@alum.mit.edu> writes:
    > 
    >>>>> * Also in section 3.3:
    >>>>>
    >>>>>      All CBOR data types are encoded in CBOR using preferred serialization
    >>>>>      and deterministic encoding as specified in Section 4 of
    >>>>>      [I-D.ietf-cbor-7049bis].  This implies in particular that the "type"
    >>>>>      and "L" components use the minimum length encoding.  The content of
    >>>>>      the "access_token" field is treated as opaque data for the purpose of
    >>>>>      key derivation.
    >>>>>
    >>>>> IIUC the type of serialization and encoding is a requirement. Will
    >>>>> need some rewording to make it so.
    >>>>
    >>>> I take it that you and Ben have agreed that the example description does
    >>>> not necessarily need normative language as the description of this key
    >>>> derivation procedure is meant as an example how the authorization server
    >>>> and the resource server can securely agree on a shared secret to be used
    >>>> between the client and the resource server.
    >>
    >> This still confuses me. IIUC preferred serialization and deterministic
    >> encoding are *optional* in CBOR. The text hear seems to require it,
    >> but doesn't use normative language to do so.
    >>
    >> If these are required for things to work then you make a normative
    >> statement about it. E.g., "The "type" and "L" components MUST use the
    >> minimum length encoding."
    >>
    >> Or do you intend that some other (non-minimum-length) MAY be used? (In
    >> which case both sides would need a side agreement on what encoding is
    >> used.)
    > 
    > The text here just gives an example how key derivation may be used by
    > the authorization server and the resource server to agree on a shared
    > secret (that is used to encrypt the traffic between the resource server
    > and the to-be-authorized client).
    > 
    > To that regard, the text is not really normative. The only normative
    > language we need here would be to avoid security issues. Commenting on
    > the data representation here is to be understood as a suggestion to use,
    > e.g., preferred CBOR serialization according to 7049bis.
    > 
    > [...]

    Sorry to be so dense, but I'm still not getting it.

    I take your point that this is only an example of a way to agree on a 
    shared secret. But at the end of the day they indeed must somehow agree 
    on a shared secret. *If* they use this technique then it will only work 
    if they also agree on a consistent way to do the serialization and 
    encoding that is otherwise not standardized. So they need a side 
    agreement, which is not a good situation for a standardized protocol.

    At the very least it seems like you should highlight that some sort of 
    out of band communication is required between the authorization and 
    resource servers to establish the shared secret or the algorithm to be 
    used for deriving the shared secret.

[GS]
I'm not sure I understand the issue correctly. 

Section 4.1 of ietf-cbor-7049bis states:
'The preferred serialization always uses the shortest form of representing the argument'

This seems to me to be in coherence with:
"All CBOR data types are encoded in CBOR using preferred serialization and deterministic encoding"
and
'This implies in particular that the "type" and "L" components use the minimum length encoding. '

If I understand right you would like to replace the latter sentence with:
'The "type" and "L" components MUST use the minimum length encoding.'

But there are multiple statements in this example which could be replaced with normative language, e.g.,:

'In this example, HKDF consists of the composition of the HKDF-Extract and HKDF-Expand steps [RFC5869].'

'The symmetric key is derived from the key identifier, the key derivation key and other data:'

'type is set to the constant text string "ACE-CoAP-DTLS-key-derivation" '


Would you be happy with only the specific normative statement you proposed (which BTW is fine to me) or would you like to see all statements like this to be replaced with normative text (or can we make a normative formulation at the beginning of the example indicating that "compliance to this example REQUIRES the following:")?

Thanks,
Göran