[Lake] Comments on draft-ietf-lake-ra-01
Marco Tiloca <marco.tiloca@ri.se> Mon, 17 March 2025 07:50 UTC
Return-Path: <marco.tiloca@ri.se>
X-Original-To: lake@mail2.ietf.org
Delivered-To: lake@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 935B2CBAA91 for <lake@mail2.ietf.org>; Mon, 17 Mar 2025 00:50:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=ri.se
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1BaRhYYZY2Hb for <lake@mail2.ietf.org>; Mon, 17 Mar 2025 00:50:32 -0700 (PDT)
Received: from GV3P280CU006.outbound.protection.outlook.com (mail-swedencentralazon11020097.outbound.protection.outlook.com [52.101.75.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id D722CCBAA73 for <lake@ietf.org>; Mon, 17 Mar 2025 00:50:31 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=DcRbaa8wz6BB2wMi6pF6VZOubjaCnAg/dRh2q/8LkBJn+kWWJ/PBsnrwW9N1KM281xc+qVQL193EooNh4FS6/WgwZHrfTvb4NzrCyNr66pLggw5J4VJyoAJBtLPbPK4npZzGEhxAuoPu/5V8JGvPor0VVVfRlXa0vrXoZ61gAlywWg5OmTL65d8OaDWVoEkIeo0OTsnsJKdmMKEA9RQPjGKsXMlccvD6twZ2LfdUFDS0Mr5ZR93kTLVdspW1S5TyWY/YHbZ5Vf7ngH5yEQPILva5IfWEEub+D4KfJSXKLnZGOHeB7BaSSuaCBRJKHrYDBEs/dv39cJ8o4L85dTH4Ig==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=MDD3q6qrHpFSK2VC6WuSiP82xayGmNhVfqfSoNgrK8Q=; b=a2kAd7OWynXHVIgTPANMFsLQVbiikdJ+5ABYggb1y3hWxVdByNXDK8tJkL6QrRSyWKe7gKwA/3NQtJ3mb29hpU91893MMw/jidJ4mGy3Kye8PQOhR997R7tkDn2OFTK16nvb/kr9nRkvDRGjak+L3PSHArE93iKXYMcOjHaOoDCAs2Im7D56oBuuRjW5mnKydXt6BBC76+HHALXvemX/Ib+2sgS7bn5b81aSwk0bDNuEhT9KxDb/sktH2Lv+KKzBUA2auhctILuOFJNM2W55TI0LIN2MzcDCOFVow0xbPrv5qLMBDrry6fTf0Kg1F02W2m6RCR0N1qQIf7FQOcVuNQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ri.se; dmarc=pass action=none header.from=ri.se; dkim=pass header.d=ri.se; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ri.se; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MDD3q6qrHpFSK2VC6WuSiP82xayGmNhVfqfSoNgrK8Q=; b=phDJPMW5vQ0JmhKth0WjuDnq57/MkCftZsn+BO33qrkl4c7vJBjgDyIFjj4wuzg+DYCd6gD4WX8UN0UXAp7te6hPSxxCx0cdpG289/yr06Lh3dpcdvc7Wma+PYbdMSUAEM4K6aJVz014cJt+lkKawmvfKDMgOv6Ldwm1E2W0cw+lQEEbh9UyDlDYlXXK79hD+Lyg9bm0vfqb15Ci1kt6TX64oWLAIHntEGVq/WdqEzBQhWP3bgQGSAZjvGUzY2KJYsbCt0DQCXRVcPUBphsw5Dy+W7K8RFH/OZH2jtg0fnlpH/taxzQqdBjCowUd8TfREDbKLOtgvZQupdTuC3gDEw==
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ri.se;
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17) by MM0P280MB1927.SWEP280.PROD.OUTLOOK.COM (2603:10a6:190:6::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8534.33; Mon, 17 Mar 2025 07:50:29 +0000
Received: from GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::b1d3:d63d:ce0b:3f70]) by GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM ([fe80::b1d3:d63d:ce0b:3f70%5]) with mapi id 15.20.8534.031; Mon, 17 Mar 2025 07:50:28 +0000
Message-ID: <198ac6e8-9e1c-43d4-ba22-a05f10489a6c@ri.se>
Date: Mon, 17 Mar 2025 08:50:18 +0100
User-Agent: Mozilla Thunderbird
Content-Language: en-US
To: "lake@ietf.org" <lake@ietf.org>
From: Marco Tiloca <marco.tiloca@ri.se>
Autocrypt: addr=marco.tiloca@ri.se; keydata= xsBNBFSNeRUBCAC44iazWzj/PE3TiAlBsaWna0JbdIAJFHB8PLrqthI0ZG7GnCLNR8ZhDz6Z aRDPC4FR3UcMhPgZpJIqa6Zi8yWYCqF7A7QhT7E1WdQR1G0+6xUEd0ZD+QBdf29pQadrVZAt 0G4CkUnq5H+Sm05aw2Cpv3JfsATVaemWmujnMTvZ3dFudCGNdsY6kPSVzMRyedX7ArLXyF+0 Kh1T4WUW6NHfEWltnzkcqRhn2NcZtADsxWrMBgZXkLE/dP67SnyFjWYpz7aNpxxA+mb5WBT+ NrSetJlljT0QOXrXMGh98GLfNnLAl6gJryE6MZazN5oxkJgkAep8SevFXzglj7CAsh4PABEB AAHNNk1hcmNvIFRpbG9jYSAobWFyY28udGlsb2NhQHJpLnNlKSA8bWFyY28udGlsb2NhQHJp LnNlPsLAdwQTAQgAIQUCWkAnkAIbAwULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAAKCRDuJmS0 DljaQwEvCACJKPJIPGH0oGnLJY4G1I2DgNiyVKt1H4kkc/eT8Bz9OSbAxgZo3Jky382e4Dba ayWrQRFen0aLSFuzbU4BX4O/YRSaIqUO3KwUNO1iTC65OHz0XirGohPUOsc0SEMtpm+4zfYG 7G8p35MK0h9gpwgGMG0j0mZX4RDjuywC88i1VxCwMWGaZRlUrPXkC3nqDDRcPtuEGpncWhAV Qt2ZqeyITv9KCUmDntmXLPe6vEXtOfI9Z3HeqeI8OkGwXpotVobgLa/mVmFj6EALDzj7HC2u tfgxECBJddmcDInrvGgTkZtXEVbyLQuiK20lJmYnmPWN8DXaVVaQ4XP/lXUrzoEzzsBNBFSN eRUBCACWmp+k6LkY4/ey7eA7umYVc22iyVqAEXmywDYzEjewYwRcjTrH/Nx1EqwjIDuW+BBE oMLRZOHCgmjo6HRmWIutcYVCt9ieokultkor9BBoQVPiI+Tp51Op02ifkGcrEQNZi7q3fmOt hFZwZ6NJnUbA2bycaKZ8oClvDCQj6AjEydBPnS73UaEoDsqsGVjZwChfOMg5OyFm90QjpIw8 m0uDVcCzKKfxq3T/z7tyRgucIUe84EzBuuJBESEjK/hF0nR2LDh1ShD29FWrFZSNVVCVu1UY ZLAayf8oKKHHpM+whfjEYO4XsDpV4zQ15A+D15HRiHR6Adf4PDtPM1DCwggjABEBAAHCwF8E GAECAAkFAlSNeRUCGwwACgkQ7iZktA5Y2kPGEwf/WNjTy3z74vLmHycVsFXXoQ8W1+858mRy Ad0a8JYzY3xB7CVtqI3Hy894Qcw4H6G799A1OL9B1EeA8Yj3aOz0NbUyf5GW+iotr3h8+KIC OYZ34/BQaOLzdvDNmRoGHn+NeTzhF7eSeiPKi2jex+NVodhjOVGXw8EhYGkeZLvynHEboiLM 4TbyPbVR9HsdVqKGVTDxKSE3namo3kvtY6syRFIiUz5WzJfYAuqbt6m3TxDEb8sA9pzaLuhm fnJRc12H5NVZEZmE/EkJFTlkP4wnZyOSf/r2/Vd0iHauBwv57cpY6HFFMe7rvK4s7ME5zctO Ely5C6NCu1ZaNtdUuqDSPA==
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------8NTgA1Ax6pxvwC7vr50zmXIJ"
X-ClientProxiedBy: SI2PR01CA0009.apcprd01.prod.exchangelabs.com (2603:1096:4:191::18) To GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM (2603:10a6:150:37::17)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: GVYP280MB0464:EE_|MM0P280MB1927:EE_
X-MS-Office365-Filtering-Correlation-Id: da4cb428-86b1-4d4c-8308-08dd652862cd
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|376014|366016|13003099007|4053099003|8096899003;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(376014)(366016)(13003099007)(4053099003)(8096899003);DIR:OUT;SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: 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
X-OriginatorOrg: ri.se
X-MS-Exchange-CrossTenant-Network-Message-Id: da4cb428-86b1-4d4c-8308-08dd652862cd
X-MS-Exchange-CrossTenant-AuthSource: GVYP280MB0464.SWEP280.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 17 Mar 2025 07:50:28.8940 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: 5a9809cf-0bcb-413a-838a-09ecc40cc9e8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: JyeEJu2/CoHxkrInEY2WOf9mkbgex1ir10PIFLoyoTe7cW1RAD7aKrsGB4OsFMKwnTbrCqRNrkzNWYoTFZGy1g==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MM0P280MB1927
Message-ID-Hash: XUVXP32UJFM3BTPHC6QOWJIIB7MQ7COI
X-Message-ID-Hash: XUVXP32UJFM3BTPHC6QOWJIIB7MQ7COI
X-MailFrom: marco.tiloca@ri.se
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Lake] Comments on draft-ietf-lake-ra-01
List-Id: Lightweight Authenticated Key Exchange <lake.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/lake/Q-gG9ueKKlAjqOKO0t8xiG2En2M>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lake>
List-Help: <mailto:lake-request@ietf.org?subject=help>
List-Owner: <mailto:lake-owner@ietf.org>
List-Post: <mailto:lake@ietf.org>
List-Subscribe: <mailto:lake-join@ietf.org>
List-Unsubscribe: <mailto:lake-leave@ietf.org>
Hi all, Please see below a few comments on draft-ietf-lake-ra. Hope it helps! Best, /Marco --------------- [Section 5.2.1.1.2] It says: > In case none of the evidence types is supported, the Relying Party rejects the first message_1 with an error indicating support for another evidence type. This requires a separate error type, in addition to the one defined for a different reason in Section 8.1. [Section 5.2.1.1.3] As to the definition of the measurements-format array, suggested changes: OLD: measurements-format = [ content-type: coap-content-format, content-format: bytes .cbor measurements-body-cbor ] NEW: measurements-format = [ content-format: uint, content: bytes .cbor measurements-body-cbor ] This still requires the defition of measurements-body-cbor ... [Section 5.2.1.1.4] It says: > The receiver MUST reply with an EAD item corresponding to the background-check model. Isn't such an EAD item exactly "Attestation_proposal" from Section 5.2.1.1.1? [Section 5.2.1.1.4] It says: > The ead_value can be empty, as the ead_label serves as the trigger. and > * ead_value = null The intended and right way is to have ead_value not present. [Section 5.2.2.1.2] It says: > Relying Party generates a nonce to ensure the freshness of the attestation result from the Verifier. Where is this nonce included? It is not shown in the Request_structure defined below or in the example in Figure 3. [Section 5.2.2.1.4] It says: > The receiver MUST reply with an EAD item corresponding to the passport model. Isn't such an EAD item exactly "Result_proposal" from Section 5.2.2.1.1? [Section 5.2.2.1.4] It says: > The ead_value can be empty, as the ead_label serves as the trigger. and > * ead_value = null The intended and right way is to have ead_value not present. [Section 6] It says: > Although there are 8 cases (IoT/Net, BG/PP, Fwd/Rev), ... I think you are also silently implying that: * Forward Message Flow means that the IoT device is the EDHOC Initiator, while it should just mean that the EDHOC Initiator is a CoAP client. * Reverse Message Flow means that the IoT device is the EDHOC Responder, while it should just mean that the EDHOC Initiator is a CoAP server. If you actually mean that, it's good to make it explicit. Otherwise, the cases are more, and the tuple needs to also indicate whether the Attester is the Initiator or the Responder. [Section 6.1] The EDHOC connection identifier C_R appears for the first time here in Figure 1, but it is never mentioned in the text here in Section 6.1 or earlier in Section 5.2.1. I guess that the intent is to allow the Verifier to correlate an Attestation Proposal with a later corresponding Evidence. If so: * Is that correlation actually required? After all, Evidence comes back as including the Nonce that the Verifier offered together with the EvidenceType(s). * A Verifier might be contacted by multiple Network Services acting as Relying Party, which might accidentally be using the same EDHOC Connection Identifier C_R in their respective EDHOC sessions with different IoT devices, thus creating ambiguity at the Verifier. [Section 10.1] It says: > The ead_label = TBD1 corresponds to the ead_value Attestation_proposal in Section 5.2.1.1.1, Attestation_request in Section 5.2.1.1.2 and Evidence in Section 5.2.1.1.3. When receiving an EDHOC message with the EAD item with label -TBD1, how does the recipient distinguish whether it is exactly about Attestation_proposal, Attestation_request or Evidence? The inclusion in one EDHOC message or other might still be ambiguous, so is that based on the unique (?) structure of the ead_value? The same goes for the later definition of the ead_label TBD3. -- Marco Tiloca Ph.D., Senior Researcher Phone: +46 (0)70 60 46 501 RISE Research Institutes of Sweden AB Box 1263 164 29 Kista (Sweden) Division: Digital Systems Department: Computer Science Unit: Cybersecurity https://www.ri.se
- [Lake] Comments on draft-ietf-lake-ra-01 Marco Tiloca
- [Lake] Re: Comments on draft-ietf-lake-ra-01 Yuxuan Song