Forgot to cc the group

-----Original Message-----
From: Jim Schaad <i...@augustcellars.com> 
Sent: Sunday, March 15, 2020 1:48 PM
To: 'draft-ietf-ace-key-groupcomm-osc...@ietf.org'
<draft-ietf-ace-key-groupcomm-osc...@ietf.org>
Subject: Review of draft-ietf-ace-key-groupcomm-oscore-05

* Introduction:  In para 2, the second sentence needs to be re-written.  If
you remove the subclause, then you get "This relies on a Group Manager where
members exchange   CoAP messages secured with Group OSCORE." Which is wrong.

* Section 2 -  The following is a problematic statement " All communications
between the involved entities rely on the CoAP protocol and MUST be
secured."  For something like MQTT you want to be able to do it in JSON/HTTP

* Section 2.2 - I think it might be worthwhile in para 3 to give the reason
for needing a new group identifier - This is because of the conflict in name
between group identifier of OSCORE and group identifier of
ace-key-groupcomm.  You have not yet stated that they are different things.

* Section 3.1 - I think I said this before but ["requester", "monitor"]
seems to be a bit of an oxymoron.  Anybody who is either a requester or a
responder can be a monitor without advertising the fact.

* Section 3.1 -  The table in figure 1 is currently not usable due to the
definition of scope in ace-key-groupcomm.

* Section 3.1 - The framework allows for the scope and the audience to be
implicit for an endpoint that is only doing one thing.  Are you sure you
want to eliminate that option?

* Section  4 - I think you probably want to justify the reason for changing
the base name of the resource.  Also the same comments that I made in
ace-key-groupcomm about registering as a well-known are going to exist if
you really want it to be fixed.

* Section 5.2 - scope should not be a mandatory element in the request - it
is implicit in the path name and the scope in the token.

* Section 5.2.1 -  Is this a place where we need to look at replay?  I don't
think so because of the cryptographic wrapper, but we need to have that
discussion in the document.  Which indicates a pointer from this section to
where that discussion is.

* Section 5.4 - cs_alg should refer to the IANA registries not the COSE
document - what if there is a new signature algorithm, like say RSA.

* Section 6 - is it an error for a monitor to provide a public key?  After
all an invalid signature would not need to be checked.   To make life even
more fun, does the rsnonce need to be provided on a token post?

* Section 8 - For bullet 2.a - Is there a reason why this does not do the
rekey and return the new key material rather than returning an error?



_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to