Re: [hrpc] [Iotops] Authorization for IoT devices

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Wed, 28 July 2021 12:40 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: hrpc@ietfa.amsl.com
Delivered-To: hrpc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DEACC3A0D7A for <hrpc@ietfa.amsl.com>; Wed, 28 Jul 2021 05:40:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=AuhdgqAq; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=AuhdgqAq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Uj7cpR7BmMx for <hrpc@ietfa.amsl.com>; Wed, 28 Jul 2021 05:40:43 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80047.outbound.protection.outlook.com [40.107.8.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 766E03A0D75 for <hrpc@irtf.org>; Wed, 28 Jul 2021 05:40:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GNxiwRZqdYdiuxxLJHcCuucr9XaJenww6eIG97NACQU=; b=AuhdgqAq8VL1GI/F8TsWabWSOLsrlImGUs2WEk9t6eqmtO4oGq/OVBBtfCaC9rwPw1mLuBrUYk/um646Z6TfIkzSMqJFDDfeMxOnlXNS0TkU5PlrnNtl7gGMXp/Rqj+e3OIZHL+lwwVLgYDXvmet4HgsmwY0mXBcliy/SpEC0e8=
Received: from DB6PR0802CA0032.eurprd08.prod.outlook.com (2603:10a6:4:a3::18) by AS8PR08MB5912.eurprd08.prod.outlook.com (2603:10a6:20b:29f::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.28; Wed, 28 Jul 2021 12:40:38 +0000
Received: from DB5EUR03FT062.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:a3:cafe::78) by DB6PR0802CA0032.outlook.office365.com (2603:10a6:4:a3::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4373.18 via Frontend Transport; Wed, 28 Jul 2021 12:40:38 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; irtf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;irtf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT062.mail.protection.outlook.com (10.152.20.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.24 via Frontend Transport; Wed, 28 Jul 2021 12:40:38 +0000
Received: ("Tessian outbound cee5995f7b16:v100"); Wed, 28 Jul 2021 12:40:38 +0000
X-CR-MTA-TID: 64aa7808
Received: from fbd871ac84d1.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 65BF678F-D1BF-469D-B382-E4CA8D400533.1; Wed, 28 Jul 2021 12:40:32 +0000
Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id fbd871ac84d1.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 28 Jul 2021 12:40:32 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HCBwHptpbN7/hnblGLkBzuTJBA4AnPVAINT+jUOj9q6xcIsv6EHks9wfAkHea1azyhsOQU+ZZkLy5ipAEdwvO0Jx5ku+jeJlluEpbbydCdSoDnpmDSXLuBYbybzEzsojxAkgStMRc/zv813Yend0s+j7HA0po+xTlFUy3xEuUv7Lw+v3PmQX08YD2clP7LpjeRQ1WAlDcZ5qBzolETQBHlVL/maLOSNRd9o3w9iOmbfqtxkQrMx9dPNPJPuBk3rGfO+0Az9930qpFg5INJNuqsepmQrWxE8xq9gK5kNtAkZNLtIoL6pAfcKk6u9WJNdO5570uP6LTBcb24z7GptTiw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GNxiwRZqdYdiuxxLJHcCuucr9XaJenww6eIG97NACQU=; b=hwGmUMGDCLTdkWtLqmHQLbVAGq9O1+5OoVDVfbgRgQVOZtoRpfRMIgMv0sAbtbC8T9M7v3Bp9ySHUI9HOM+CljtZo28yPUtWfc/sZ+YkxzavQ/yoQf8m1jHGZiDPg42RGlOHXAKq9gYvVlA2CLVUV8uO9UphSdY97FTF+TgEEUglZasFn91New7Hbjhhlz4c0/0xtA/BIlDEEtOTP2HFvOky94lzPTZAP+XNsgPpe6IXwTo+12/TUirnaj1vKwgPHIChbEnS5XOcInMn/6r8NJmXoffXT+sKHnPKTW3Ao8amkrV/pCmhTNlJ9gb5cIC9axBEJNi+rkOWdOmtHIbaKg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GNxiwRZqdYdiuxxLJHcCuucr9XaJenww6eIG97NACQU=; b=AuhdgqAq8VL1GI/F8TsWabWSOLsrlImGUs2WEk9t6eqmtO4oGq/OVBBtfCaC9rwPw1mLuBrUYk/um646Z6TfIkzSMqJFDDfeMxOnlXNS0TkU5PlrnNtl7gGMXp/Rqj+e3OIZHL+lwwVLgYDXvmet4HgsmwY0mXBcliy/SpEC0e8=
Received: from DBBPR08MB5915.eurprd08.prod.outlook.com (2603:10a6:10:20d::17) by DB8PR08MB5514.eurprd08.prod.outlook.com (2603:10a6:10:fa::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4352.25; Wed, 28 Jul 2021 12:40:24 +0000
Received: from DBBPR08MB5915.eurprd08.prod.outlook.com ([fe80::55c7:8f34:351:9518]) by DBBPR08MB5915.eurprd08.prod.outlook.com ([fe80::55c7:8f34:351:9518%3]) with mapi id 15.20.4373.018; Wed, 28 Jul 2021 12:40:24 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Michael Richardson <mcr+ietf@sandelman.ca>, "hrpc@irtf.org" <hrpc@irtf.org>, "iotops@ietf.org" <iotops@ietf.org>
Thread-Topic: [Iotops] Authorization for IoT devices
Thread-Index: AQHXgouVFWMKuox4kUWxdOEjkHQAe6tWlvdQgAEKVACAALMi8A==
Date: Wed, 28 Jul 2021 12:40:24 +0000
Message-ID: <DBBPR08MB5915C85637CDD702C2250659FAEA9@DBBPR08MB5915.eurprd08.prod.outlook.com>
References: <18201.1627351357@localhost> <DBBPR08MB5915856184BCB76D521132FDFAE99@DBBPR08MB5915.eurprd08.prod.outlook.com> <23319.1627437136@localhost>
In-Reply-To: <23319.1627437136@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 381A9AA45E76294590231470CCC43E32.0
x-checkrecipientchecked: true
Authentication-Results-Original: sandelman.ca; dkim=none (message not signed) header.d=none; sandelman.ca; dmarc=none action=none header.from=arm.com;
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-Correlation-Id: 39b60577-edf8-4978-97d6-08d951c4e76b
x-ms-traffictypediagnostic: DB8PR08MB5514:|AS8PR08MB5912:
X-Microsoft-Antispam-PRVS: <AS8PR08MB591200386430BAAC2547CE00FAEA9@AS8PR08MB5912.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:6108;OLM:7219;
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBBPR08MB5915.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(346002)(376002)(39850400004)(366004)(396003)(136003)(55016002)(9686003)(7696005)(316002)(66946007)(6506007)(186003)(8936002)(53546011)(8676002)(478600001)(2906002)(71200400001)(26005)(83380400001)(5660300002)(64756008)(38100700002)(33656002)(66476007)(86362001)(110136005)(76116006)(66574015)(66556008)(122000001)(66446008)(38070700005)(52536014); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5514
Original-Authentication-Results: sandelman.ca; dkim=none (message not signed) header.d=none; sandelman.ca; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT062.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 2513cc5b-364d-4228-d156-08d951c4deb7
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(376002)(396003)(346002)(39850400004)(136003)(36840700001)(46966006)(9686003)(356005)(8676002)(110136005)(5660300002)(316002)(53546011)(47076005)(33656002)(478600001)(55016002)(2906002)(36860700001)(336012)(70206006)(7696005)(82310400003)(86362001)(186003)(52536014)(26005)(82740400003)(70586007)(8936002)(6506007)(66574015)(83380400001)(81166007); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Jul 2021 12:40:38.7289 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 39b60577-edf8-4978-97d6-08d951c4e76b
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT062.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR08MB5912
Archived-At: <https://mailarchive.ietf.org/arch/msg/hrpc/hcwwW1lFbcn2hfHOcl4V9i7sqLg>
Subject: Re: [hrpc] [Iotops] Authorization for IoT devices
X-BeenThere: hrpc@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: hrpc discussion list <hrpc.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/hrpc>, <mailto:hrpc-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hrpc/>
List-Post: <mailto:hrpc@irtf.org>
List-Help: <mailto:hrpc-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/hrpc>, <mailto:hrpc-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jul 2021 12:40:49 -0000

Hi Michael,

Remarks below:

-----Original Message-----
From: Michael Richardson <mcr+ietf@sandelman.ca>
Sent: Wednesday, July 28, 2021 3:52 AM
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; hrpc@irtf.org; iotops@ietf.org
Subject: Re: [Iotops] Authorization for IoT devices


Hannes Tschofenig <Hannes.Tschofenig@arm.com> wrote:
    > Have you tried to use ACE-OAuth, Michael?

My understanding is that it requires a AS to evaluate the request and the generate a ticket/token for the RS.

[Hannes] You have to get the permissions from somewhere since you can hardly create your own permissions...

1) many people perceive the AS as being the cloud component and they don't
   want a cloud part.

[Hannes] The AS may be in the cloud but it may be anywhere else -- whatever is most appropriate in a given deployment.

2) but in any case, it's the form of the rules which the AS evaluates to
   make the authorization decision that I care about.  AFAIK, neither
   OAUTH2 or ACE-OAUTH standardizes that (or intends to).

[Hannes] In deployments today the rules are not standardized because they are configured by the user/admin into the AS. What gets pushed around are permissions, which are defined for specific application domains. These permissions are called "scopes" in the OAuth language. Some of those scopes have been standardized.

There has also been an attempt to standardize more generic ACLs,
see draft-ietf-ace-aif.

    > The work in the ACE group had the goal to develop an authorization
    > solution for IoT devices.

If I'm wrong please correct me.
How would ACE-OAuth identify the local Sheriff?

[Hannes] The purpose of an authorization framework is not to identify a specific person. That's the role of an identity management framework. What ACE/OAuth would be able to do is to give the local sheriff a token so that they can access specific resources. What resources they can access depends on the configured authorization policies.

If you also want to add the identity management piece to ACE/OAuth (which people have obviously done), then you can add OpenID Connect and, for example, FIDO to the mix.

I hope this now makes more sense.

Ciao
Hannes


--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.