Thanks for the feedbacks Olaf. So I understand why we need such flexibility
on the client side. The main reason seems that the communication with the
AS is seen as bootstrapping the communication between the client and the RS
and as such we would like to keep them as independent as possible.

I see interoperability being achieved when a) client, RS, and AS
implemented by independent vendors and b) all three follow the framework
and the given profile is sufficient to make them work together. Currently
the client - RS communication is well defined, but the client AS
communication is left to a RECOMMENDATION.

RFC2119 defines RECOMMEND as follows:

SHOULD   This word, or the adjective "RECOMMENDED", mean that there
   may exist valid reasons in particular circumstances to ignore a
   particular item, but the full implications must be understood and
   carefully weighed before choosing a different course.


The question becomes how RECOMMENDED is sufficient or not.



It seems to me the definition above makes it clear that
the recommended protocol is expected to be supported, and AS or clients
that are independently developed are expected to support the recommended
protocol. To ensure the implementers are well aware of the consequences of
the implication we could clarify this explicitly. Of course this does not
provide a formal proof for interoperability, but this seems acceptable in
the scope of a framework.

>From the latest suggestion, I would propose the following changes, - that I
expect will reach consensus. Please let us know by Friday  March 5 if you
agree or disagree with the proposed changes.

 Section 5:
OLD
"Profiles MUST specify a communication security protocol that provides the
features required above."

NEW
"Profiles MUST specify a communication security protocol between client and
RS that provides the features required above. Profiles MUST  specify a
communication security protocol RECOMMENDED to be used between client and
AS that provides the features required above. Profiles MUST  specify for
introspection a communication security protocol RECOMMENDED to be used
between RS and AS that provides the features required above. Such
recommendations are expected, among others, to guarantee independent
implementations interoperate."

Section 6.2:
OLD
  "Profiles MUST specify how communication security according
   to the requirements in Section 5 is provided."
NEW
"The requirements for communication security of profiles are specified
in Section 5."


Yours,
Daniel




On Tue, Mar 2, 2021 at 10:20 AM Olaf Bergmann <bergm...@tzi.org> wrote:

> Hi Daniel,
>
> On 2021-03-02, Daniel Migault <mglt.i...@gmail.com> wrote:
>
> > This is just a follow-up. I would like to be able to close this issue
> > by the end of the week, and so far I have not heard any issues for
> > profile mandating a protocol. On the other hand, not mandating a
> > specific protocol comes with interoperability issues. So unless more
> > feed back is provided, I am currently leaning toward ensuring
> > interoperability.
> >
> > It  would be good for me to hear from the WG and understand what
> concrete deployment
> > issues the two statements below would raise:
> >     * OSCORE profile mandating the AS to support OSCORE and have the C
> <-> AS using
> > OSCORE.
> >     * DTLS profile mandating the AS to support DTLS and have the C <->
> AS using DTLS.
>
> I think the major issue is that a client that implements both OSCORE and
> DTLS cannot just switch from one mechanism to the other because it must
> stick to either one or the other. This also raises the question what
> happens if an AS is contacted by the client via OSCORE but the RS only
> supports DTLS: Is the client allowed to switch from OSCORE to DTLS if
> the AS says so?
>
> Another aspect is that we would need to add another specification if a
> client implementing the DTLS profile wants to contact the AS via TLS. As
> CoAP over TLS is well-defined, this would not make any difference
> regarding the security or the handling in the application, but mandating
> DTLS in the profile would currently preclude the use of TLS.
>
> Grüße
> Olaf
>


-- 
Daniel Migault
Ericsson
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to