Re: [Iotops] Authorization for IoT devices

Michael Richardson <mcr+ietf@sandelman.ca> Wed, 28 July 2021 18:25 UTC

Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26BD53A1B1D for <iotops@ietfa.amsl.com>; Wed, 28 Jul 2021 11:25:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3MKXx7EcReWG for <iotops@ietfa.amsl.com>; Wed, 28 Jul 2021 11:25:46 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE5923A1B0A for <iotops@ietf.org>; Wed, 28 Jul 2021 11:25:46 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id 1A439389A0; Wed, 28 Jul 2021 14:29:35 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id D2ZJnZdzEIJ8; Wed, 28 Jul 2021 14:29:29 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id C4EEC3899E; Wed, 28 Jul 2021 14:29:29 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id B2B4E72; Wed, 28 Jul 2021 14:25:39 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
cc: "hrpc\@irtf.org" <hrpc@irtf.org>, "iotops\@ietf.org" <iotops@ietf.org>
In-Reply-To: <DBBPR08MB5915C85637CDD702C2250659FAEA9@DBBPR08MB5915.eurprd08.prod.outlook.com>
References: <18201.1627351357@localhost> <DBBPR08MB5915856184BCB76D521132FDFAE99@DBBPR08MB5915.eurprd08.prod.outlook.com> <23319.1627437136@localhost> <DBBPR08MB5915C85637CDD702C2250659FAEA9@DBBPR08MB5915.eurprd08.prod.outlook.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Wed, 28 Jul 2021 14:25:39 -0400
Message-ID: <2926.1627496739@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/J1r6N65uAYR8-1UDZDbH5EDqtEA>
Subject: Re: [Iotops] Authorization for IoT devices
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>, <mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>, <mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jul 2021 18:25:52 -0000

Hannes Tschofenig <Hannes.Tschofenig@arm.com> wrote:
    mcr> 2) but in any case, it's the form of the rules which the AS evaluates to
    mcr> make the authorization decision that I care about.  AFAIK, neither
    mcr> OAUTH2 or ACE-OAUTH standardizes that (or intends to).

    Hannes> In deployments today the rules are not standardized because they
    Hannes> are configured by the user/admin into the AS. What gets pushed
    Hannes> around are permissions, which are defined for specific
    Hannes> application domains. These permissions are called "scopes" in the
    Hannes> OAuth language. Some of those scopes have been standardized.

Thank you for confirming my understanding.
I'm looking for a standard for the rules.

Why? because auditing, because humans need to understand them, because
configuring the rules needs to be something non-experts can do.

    > There has also been an attempt to standardize more generic ACLs,
    > see draft-ietf-ace-aif.

Not even close, I think.

    mcr> If I'm wrong please correct me.
    mcr> How would ACE-OAuth identify the local Sheriff?

    Hannes> The purpose of an authorization framework is not to identify a
    Hannes> specific person. That's the role of an identity management
    Hannes> framework.

It's not a specific person, it's a specific role in an particular geography.
That's why this problem is non-trivial.

    > If you also want to add the identity management piece to ACE/OAuth
    > (which people have obviously done), then you can add OpenID Connect
    > and, for example, FIDO to the mix.

If we can really do this with those specifications, I'd be interested in
knowing how, or seeing an example of a system which has done that.

I'm actually convinced that we don't need a lot of new work ("new
ingredients") to make things go, but I think that we need a clear
architecture on combining existing work ("better recipes")

--
Michael Richardson <mcr+IETF@sandelman.ca>   . o O ( IPv6 IøT consulting )
           Sandelman Software Works Inc, Ottawa and Worldwide