Document Action: 'OCRA: OATH Challenge-Response Algorithms' to Informational RFC (draft-mraihi-mutual-oath-hotp-variants-14.txt)

The IESG <iesg-secretary@ietf.org> Sat, 26 March 2011 11:01 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@core3.amsl.com
Delivered-To: ietf-announce@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id E4A923A6926; Sat, 26 Mar 2011 04:01:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dXUUXne2vYsX; Sat, 26 Mar 2011 04:01:20 -0700 (PDT)
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 88ABA3A692D; Sat, 26 Mar 2011 04:01:20 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: Document Action: 'OCRA: OATH Challenge-Response Algorithms' to Informational RFC (draft-mraihi-mutual-oath-hotp-variants-14.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 3.12
Message-ID: <20110326110120.8821.60284.idtracker@localhost>
Date: Sat, 26 Mar 2011 04:01:20 -0700
Cc: Internet Architecture Board <iab@iab.org>, RFC Editor <rfc-editor@rfc-editor.org>
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-announce>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 26 Mar 2011 11:01:22 -0000

The IESG has approved the following document:
- 'OCRA: OATH Challenge-Response Algorithms'
  (draft-mraihi-mutual-oath-hotp-variants-14.txt) as an Informational RFC

This document has been reviewed in the IETF but is not the product of an
IETF Working Group.

The IESG contact person is Sean Turner.

A URL of this Internet Draft is:
http://datatracker.ietf.org/doc/draft-mraihi-mutual-oath-hotp-variants/




Technical Summary

This document describes an algorithm for challenge-response authentication 
developed by the "Initiative for Open AuTHentication" (OATH). The specified 
mechanism is based on the  algorithm is based on the HMAC-Based One-Time 
Password Algorithm (HOTP). 

Working Group Summary

This document was developed outside the IETF, namely in the OATH community. 
A number of OATH members participate in the IETF KEYPROV working group 
and brought this work forward to the IETF.

Document Quality

This document is an AD-sponsored submission and has enjoyed review within 
the OATH community. Implementations of the specification exist.

Personnel

Hannes Tschofenig <Hannes.Tschofenig@gmx.net> is the document shepherd for this document.
Sean Turner <turners@ieca.com> is the sponsoring Area Director. 

RFC Editor Note

  1) Replace reference to RFC 2279 --> RFC 3629.
RFC 2279 was obsoleted. This occurs in 2 places section 5.1 and section 12.1.

2) Section 5.1, replace the following text  

   o  T is an 8-byte unsigned integer in big endian (i.e. network byte
      order) representing the number of time-steps(seconds, minutes,
      hours or days depending on the specified granularity) since
      midnight UTC of January 1, 1970.  More specificatlly, if the OCRA
      computation includes a timestamp T, you should first convert your
      current local time to UTC time; you can then derive the UTC time
      in the proper format (i.e. seconds, minutes, hours or days elapsed
      from Epoch time); the size of the time-step is defined in the
      OCRASuite string

With

   o  T is an 8-byte unsigned integer in big endian (i.e. network byte
      order) representing the number of time-steps(seconds, minutes,
      hours or days depending on the specified granularity) since
      midnight UTC of January 1, 1970.  More specificatlly, if the OCRA
      computation includes a timestamp T, you should first convert your
      current local time to UTC time; you can then derive the UTC time
      in the proper format (i.e. seconds, minutes, hours or days elapsed
      from Epoch time); the size of the time-step is specified in the
      OCRASuite string as described in section 6.3

3) Section 5 - remove repeated word 'section' from the statement below...

   computation from the secret key K and the DataInput material;
   CryptoFunction is described in details in section Section 5.2

4) Replace 'digital signature' with 'electronic signature'. 
There are 4 occurrences in the document. 

5) Section 1 - Introduction. Replace the text - 

   Additionally, this specification describes the means to create
   symmetric key based short digital signatures.  Such signatures are
   variants of challenge-response mode where the data to be signed
   becomes the challenge.

With 

   Additionally, this specification describes the means to create
   symmetric key based short 'electronic signatures'.  Such signatures are
   variants of challenge-response mode where the data to be signed
   becomes the challenge or is used to derive the challenge. Note that 
   the term 'electronic signature' and 'signature' are used interchangeably 
   in this document. 

6 a)  Add reference to RFC6030 (Portable Symmetric Key Container) in section 12.2

   [RFC6030]  Hoyer, P., Pei, M., and S. Machani, "Portable Symmetric
              Key Container (PSKC)", RFC 6030, October 2010,
              <http://www.ietf.org/rfc/rfc6030.txt>.

6 b) Add sentence to section 6 after the following sentence...

   ...for more sophisticated client-server interactions these values may
   be negotiated for every transaction. 

New text- 

   ...for more sophisticated client-server interactions these values may
   be negotiated for every transaction. 

   The provisioning of OCRA keys and related metadata such as OCRASuite is 
   out of scope for this document. [RFC6030] specifies one key container 
   specification that facilitates provisioning of such data between the 
   client and the server.