Hello Francesca, Comments inline. Update will be posted shortly.
/Ludwig -----Original Message----- From: Francesca Palombini <francesca.palomb...@ericsson.com> Sent: den 10 maj 2021 20:42 To: Seitz Ludwig <ludwig.se...@combitech.se>; The IESG <i...@ietf.org> Cc: art-...@ietf.org; ace-cha...@ietf.org; draft-ietf-ace-oauth-au...@ietf.org; ace@ietf.org Subject: Re: [EXTERNAL] [Ace] Francesca Palombini's Discuss on draft-ietf-ace-oauth-authz-38: (with DISCUSS and COMMENT) Hi Ludwig, authors, Thank you for all the work on the document. I have checked all my comments (including those that you have addressed in v-39 and not reported below), and I am good with almost all of them. Considering the clarifications added as a response to my comments regarding CoAP using CBOR encoding, and HTTP using the encoding from OAuth 2.0, I believe the document is now in good shape and not confusing anymore. I understand that when CoAP is used, CBOR MUST be used; when HTTP is used, semantics and encodings of OAuth 2.0 MUST be used. Any other encodings/transport protocol would have to be defined by a different specification. Regarding my request for clarification on mixing different protocols (HTTP/CoAP) on different legs of the exchange, I understand that it is not in scope of this document, and it would rather be up to the profile defining such a mix to motivate and explain the use case, so I am fine with it. Your clarifications on the use of HTTP also addresses my last DISCUSS point - a new media type is not required, as the framework now effectively reuses OAuth 2.0 encodings. Any other specification (such as MQTT) which aims to use the JSON equivalent of what defined here for CBOR instead of the OAuth encoding will define and register their own media type. I hope we can discuss the leftover comments (especially the last point about using several profiles together) at the interim tomorrow. However, these are non-blocking points, so I will go ahead and remove my DISCUSS now. Thanks again, Francesca >Hello Francesca, > >Thank you for your review, sorry for the long response time. > >Version -39 addresses some of your comments >https://datatracker.ietf.org/doc/html/draft-ietf-ace-oauth-authz-39 > >I have replies on the remaining comment as follows below (prefixed with >'LS:') > >Regards, > >Ludwig > >1. ----- > > sufficiently compact. CBOR is a binary encoding designed for small > code and message size, which may be used for encoding of self > contained tokens, and also for encoding payloads transferred in > protocol messages. > >FP: "may be used" make it seem as if CBOR is always optional (even when >CoAP is used). See points 11. and 13. for examples of text that seem to >imply that CBOR is mandatory in some cases. > >LS: This is a lower-case "may", so it does not have a normative meaning. >There are indeed cases where CBOR is mandatory (e.g. when CoAP is used). > FP: Lower case "may" only makes it so that the corresponding text is not "required for interoperation or to limit behavior which has potential for causing harm" (to quote BCP 14). Even without its BCP 14 normative meaning, the text hinted that CBOR is optional IMO, which is misleading. I would suggest the following: OLD: sufficiently compact. CBOR is a binary encoding designed for small code and message size, which may be used for encoding of self contained tokens, and also for encoding payloads transferred in protocol messages. NEW: sufficiently compact. CBOR is a binary encoding designed for small code and message size. CBOR is used when CoAP is used for encoding of self contained tokens, and also for encoding payloads transferred in protocol messages. This should go with the direction you point out below for CoAP implies CBOR, HTTP implies whatever OAuth 2.0 defined. [LS] I don't like the "is used ... is used" in your suggestion. I'll rephrase it to " ... size. Self-contained tokens and protocol message payloads are encoded in CBOR when CoAP is used." >9. ----- > > parameters. When profiles of this framework use CoAP instead, it is > REQUIRED to use of the following alternative instead of Uri-query > parameters: The sender (client or RS) encodes the parameters of its > request as a CBOR map and submits that map as the payload of the POST > request. > >FP: I think it should be better defined (or at least hinted in this >paragraph) the mapping between the CBOR encoded parameters and the Uri-query >parameters: >are they all encoded as CBOR text strings? > >LS: The encoding depends on the type of the parameter and is described >for each parameter individually FP: I think it makes sense here to state that this document describes the CBOR encoding for the existing parameters, and that if a document needs any other parameters (defined in OAuth by a future document) then the encoding for Ace needs to be specified by that document as well. This is just to clarify that you can't just use OAuth parameters with CoAP. LS: Ok I'll add more text to clarify > >18. ----- > > "x" : b64'usWxHK2PmfnHKwXPS54m0kTcGJ90UiglWiGahtagnv8' > >FP: noted here since this is the first time it appears, but same >comment for the rest of the document. I think it would make more sense >to show examples where CBOR byte strings are used instead of Base64. > >LS: CBOR diagnostic notation allows the use of Base64 encoding, what other >encoding are you suggesting? FP: Just sending hexadecimals CBOR byte strings instead of Base64 encoded strings. So for example in this case, replace the above with: "x" : h'BAC5B11CAD8F99F9C72B05CF4B9E26D244DC189F745228255A219A86D6A09EFF' LS: Using hex notation makes the representation longer and adds clutter to the document. The B64 notation is just for the CBOR diagnostic notation, it still translates to exactly the same CBOR byte string as the hex notation in raw CBOR. > >19. ----- > > Figure 8 summarizes the parameters that can currently be part of the > Access Information. Future extensions may define additional > parameters. > >FP: This is useful! Why not having the same type of figure listing all >acceptable parameters for the request (section 5.8.1)? > >LS: Because those paramters depend on the grant type, and with all the >existing OAuth 2.0 grant types this list would become very long and >include a lot of parameters that are not very useful for ACE-OAuth. >Note that IANA has a very nice listing here: >https://www.iana.org/assignments/oauth-parameters/oauth-parameters.xhtm >l#parameters FP: And the fact that there are a lot of parameters that would not be very useful for Ace is exactly why I think such a list (containing only the parameters that *are* expected to be used with Ace) would be helpful. But ok to skip if you don't think so. LS: I will not object if someone else contributes this, but I don't believe it is necessary and will skip it myself. > >32. ----- > > The POST method SHOULD NOT be allowed on children of the authz-info > endpoint. > >FP: What children? They do not seem to be defined, so I do not >understand this sentence. > >LS: RESTful resources may have child resources, so there could be >/authz-info/token1345 and so on. These should not be POST-able. FP: Ok, my point is that such child resources or their meaning and functionalities is not defined in this document, hence it seems strange to add a requirement on them. LS: Ok I'll remove that sentence. >37. ----- > > There may be use cases were different profiles of this framework are > combined. For example, an MQTT-TLS profile is used between the > client and the RS in combination with a CoAP-DTLS profile for > interactions between the client and the AS. The security of a > profile MUST NOT depend on the assumption that the profile is used > for all the different types of interactions in this framework. > >FP: This seems strange - maybe I just don't understand how this is >supposed to work, but each profile defines exactly at least C - RS >communication and security, if several are combined, it seems that at >least the C-RS would conflict. > >LS: You could use one profile for C-RS (e.g. MQTT) and another one for C-AS >(e.g. DTLS) in the same interaction. So the writer of e.g. the DTLS profile >MUST NOT make security assumptions that this profile is used on _every_ leg of >the communication. > FP: Ok, I see, you mean that the C-RS interaction uses for example one profile, while the C-AS uses another? I am not convinced this text is enough - first of all you'd have to make sure that the profiles are "combinable" - the OSCORE profile for example requires the security context to be derived, and simply using another profile without tweaking it would not be enough. Additionally, I am confused about the implications for implementers to mix and match different profiles for different legs of communication, this sounds like interoperability could be an issue. Can we discuss this more? LS: I don't really see the problem here. Say you have a client that uses DTLS to talk to the AS. The AS determines that the client should use the OSCORE profile to talk to the RS and prepares the token accordingly (including the OSCORE parameters in the cnf claim of the token and the cnf parameter of the response). The client is informed of the chosen profile with the 'profile' parameter and proceeds to derive the OSCORE context for client-RS communication. _______________________________________________ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace