Markdown Version | Session Recording
Session Date/Time: 08 May 2023 13:00
ACE
Summary
The ACE Working Group held an interim meeting to discuss the status of several active drafts. The primary focus of the meeting was an in-depth review of draft-ietf-ace-est-oscore based on feedback received. Extensive discussion took place on various technical points raised in a review, leading to several agreed-upon actions for clarifying and improving the document. Updates were also provided for draft-ietf-ace-revoke-token-ntf, draft-ietf-ace-oscore-profile, and draft-ietf-ace-oscore-gm-admin.
Key Discussion Points
Revoke Token Notification (draft-ietf-ace-revoke-token-ntf)
- Status: An update addressing reviews from the working group last call (WGLC) has been submitted. Authors will reply to the mailing list.
- Next Steps: The draft is ready for shepherd review and write-up.
OSCORE Profile (draft-ietf-ace-oscore-profile)
- Status: No updates from the authors in time for this interim meeting.
- Next Steps: Planned updates will be worked on after the shepherd write-up for
draft-ietf-ace-revoke-token-ntfis complete, targeting the next interim or IETF meeting.
OSCORE GM Admin (draft-ietf-ace-oscore-gm-admin)
- Status: Work has begun on splitting the draft. A new repository has been created on the ACE GitHub organization for the new document. Content is being pulled from the main draft.
- Next Steps: Once complete,
gmnandgm-admin-corewill be published as version 0 drafts.
CoAP EST OSCORE (draft-ietf-ace-est-oscore)
Malisa presented updates and discussed remaining comments from a review by Marco.
- EST Client Role in Ad-hoc Flow:
- Discussion: The draft implicitly assumes the EST client is the Ad-hoc initiator. A question was raised about whether a reverse flow (EST client as Ad-hoc responder) could be ruled out. No use cases were identified for such a reverse flow.
- Decision: The document will explicitly specify in Section 3 that the EST client must play the role of the Ad-hoc initiator. There was a sense of those present indicating approval for this.
- Channel Binding with Pre-shared OSCORE Key Material:
- Discussion: The draft specifies Ad-hoc exporter-based channel binding, mimicking RFC 9148's approach to TLS 1.3 exporter. A question arose if channel binding is possible or required when OSCORE key material is pre-shared and Ad-hoc was not executed. It was clarified that the intention to counter TLS 1.2 triple shake is from RFC 9148, not directly applicable here as Ad-hoc is used for authentication. For pre-shared OSCORE, if no interactive protocol establishes the material, channel binding might not be applicable.
- Decision: The draft will specify that Ad-hoc exporter-based channel binding is applicable only when Ad-hoc is executed and not for cases where pre-shared OSCORE context is used.
- Transport of PKCS#10 Request/Response in EAD Fields:
- Discussion: A suggestion was made to transport PKCS#10 requests and responses in EAD3 and EAD4 items of Ad-hoc messages, particularly for message 4. The authors' rationale for not doing so is to maintain homogeneity with re-enrollment flows, where Ad-hoc is not required and EST payloads are carried within OSCORE-protected messages.
- Action Item: Further clarification will be provided on the mailing list regarding this choice, particularly concerning re-enrollment and potential optimizations.
- Mandating
oscAttribute in Links:- Discussion: RFC 8613 states the
oscattribute is optional. The question was whether it should remain optional for EST resources. An example was given where not mandating it could lead to ambiguity, e.g., accessing a resource over DTLS might signal EST CoAP-s instead of EST OSCORE. - Decision: The
oscattribute in links to EST resources will be mandated to explicitly signal the use of EST OSCORE. This received support from those present.
- Discussion: RFC 8613 states the
- Server-Side Generation of Keys (Unencrypted Private Key):
- Discussion: Unlike RFC 9148 where the private key is encrypted, it was questioned if
draft-ietf-ace-est-oscorecould return an unencrypted PKCS#8 private key, given that OSCORE provides end-to-end encryption for the entire EST payload. This would open up a new content format pair. - Decision: The draft will specify that an unencrypted PKCS#8 private key can be returned, and a new content format pair for this will be used, due to the end-to-end OSCORE protection. There was a sense of those present indicating approval.
- Discussion: Unlike RFC 9148 where the private key is encrypted, it was questioned if
- Content Format Support:
- Discussion: The draft intends to support content formats similar to RFC 9148 but did not explicitly state this.
- Decision: The draft will explicitly state the supported content formats and include a table summarizing them, similar to Table 3 in RFC 9148.
- CoAP Options in Section 4.4 (Normative Language):
- Discussion: Section 4.4 uses "it is recommended that" for several requirements (e.g., delayed responses, support for CoAP options like
oscore,URI-Host,Block1,Block2, and HTTPS-to-CoAP/CoAPs translation). A reviewer suggested these should be "must" requirements. During the discussion, concerns were raised about the "restatement anti-pattern" if these were presented as new normative requirements. Instead, it was suggested they are logical consequences of using the protocol. - Decision: The language in Section 4.4 will be rephrased to use informative language, such as "Note that...", rather than normative keywords (e.g., "must," "required"), to indicate these are natural consequences of implementing the protocol.
- Discussion: Section 4.4 uses "it is recommended that" for several requirements (e.g., delayed responses, support for CoAP options like
- CoAP vs. CoAPs Scheme for HTTPS Translation:
- Discussion: A sentence stated that "EST URLs based on HTTPS are translated to co-op but with mandatory use of the co-op Oscar option." It was pointed out that the scheme is
coapsif DTLS is also used. - Decision: The draft will explicitly mention that if DTLS is used, the translation scheme is
coaps.
- Discussion: A sentence stated that "EST URLs based on HTTPS are translated to co-op but with mandatory use of the co-op Oscar option." It was pointed out that the scheme is
- Mandating Block 1 and Block 2 (follow-up on Section 4.4):
- Discussion: Following the decision for Section 4.4 to use informative language, the implication for
Block1andBlock2support was discussed. Concerns were raised about potential interoperability issues ifBlock1andBlock2support were optional, especially when dealing with large certificates. Reference was made to RFC 9148, which mandatesBlock1andBlock2for servers, andBlock2for clients (andBlock1for clients sending large requests). - Action Item: Malisa will review all CoAP options and their normative requirements in RFC 9148 and ensure consistent and normative mapping for
draft-ietf-ace-est-oscorewhere appropriate.
- Discussion: Following the decision for Section 4.4 to use informative language, the implication for
- Secure Association Between EST Client and CoAP-HTTP Proxy:
- Discussion: Section 5 describes a secure association (e.g., TLS) between the EST client and a CoAP-to-HTTP proxy. A suggestion was made to also reference OSCORE as an alternative for this leg, citing an individual draft on OSCORE-capable proxies. The figure might also need clarification.
- Decision: A paragraph will be added to the text to explain that both DTLS and OSCORE can be used for establishing a secure association between the EST client and the CoAP-to-HTTP proxy.
Decisions and Action Items
- For
draft-ietf-ace-est-oscore:- Decision: Explicitly specify in Section 3 that the EST client must play the role of the Ad-hoc initiator.
- Decision: Specify that Ad-hoc exporter-based channel binding is applicable only when Ad-hoc is executed, not for pre-shared OSCORE context.
- Action Item: (Malisa) Provide clarification on the mailing list regarding why PKCS#10 requests/responses are not transported in EAD fields for homogeneity with re-enrollment.
- Decision: Mandate the
oscattribute in links to EST resources. - Decision: Specify that the private key can be returned as unencrypted PKCS#8 (due to OSCORE E2E protection) and define a new content format pair for it.
- Decision: Explicitly state content format support and include a summary table similar to RFC 9148 Table 3.
- Decision: Rephrase Section 4.4 to use informative language ("Note that...") rather than normative keywords for general CoAP option requirements.
- Decision: Explicitly mention that if DTLS is used, the scheme for HTTPS translation is
coaps. - Action Item: (Malisa) Review all CoAP options in the document, particularly
Block1andBlock2, and ensure their normative requirements align consistently with RFC 9148. - Decision: Add a paragraph explaining that both DTLS and OSCORE can be used for secure association between the EST client and a CoAP-to-HTTP proxy.
- Action Item: (Malisa) Respond to Marco's review on the mailing list and release a new version of
draft-ietf-ace-est-oscoreby mid-next week incorporating these changes.
- For
draft-ietf-ace-revoke-token-ntf:- Action Item: (Yoron, Shepherd) Complete the shepherd write-up within the next two weeks.
Next Steps
draft-ietf-ace-est-oscorewill see a new version addressing the discussed review comments and clarifications.- The shepherd write-up for
draft-ietf-ace-revoke-token-ntfis expected to be completed soon. - Work on splitting
draft-ietf-ace-oscore-gm-adminwill continue, with version 0 drafts (gmnandgm-admin-core) expected for publication. - Discussions on
draft-ietf-ace-website-profilewill resume in the second half of May between the authors. - Updates for
draft-ietf-ace-oscore-profileare planned for the next meeting or IETF.