Re: [Ace] Review draft-ietf-ace-coap-est / Removal of CBOR-wrapped ASN.1 ?

2018-12-19 Thread Peter van der Stok
Hi esko,

apologies for being unclear.
The CBOR wrapping is removed. It is only present for response of server
key generation /skg

Peter
Esko Dijk schreef op 2018-12-19 13:32:

> Dear Panos & Peter,
> 
> On Jim's first point for section 4.1 below (content encoding) - will the 
> CBOR-wrapped ASN.1 payload be changed to "pure" ASN.1 payload for the media 
> types that are non-multipart?
> I agree with Jim that the CBOR wrapping in this case is not needed (since the 
> CoAP Content-Format / media type id will tell the receiver how it is encoded 
> anyhow).  Also it seems harmful in this case, since an existing CoAP media 
> type-plus-encoding is "overloaded" with a second encoding if we allow the 
> CBOR-wrapping. Doing this would require registering a new value in the CoAP 
> Content-Formats registry, e.g. like "application/csrattrs+cbor" and then it 
> would be ok.
> 
> I'm asking this because in implementations we now use the CBOR-wrapping and 
> if we don't make the change now it will stay that way most likely. And the 
> present "EDnote" in the text is not so clear on what will happen.
> 
> Best regards
> Esko Dijk
> 
> -Original Message-
> From: Ace  On Behalf Of Panos Kampanakis (pkampana)
> Sent: Monday, September 17, 2018 18:56
> To: Jim Schaad ; draft-ietf-ace-coap-...@ietf.org
> Cc: 'ace' 
> Subject: Re: [Ace] Review draft-ietf-ace-coap-est
> 
> Hi Jim,
> We have now addressed all the issues you brought up in July. The fixes will 
> be in the last iteration. 
> We will still make some cosmetic updates and post a new version.
> Thank you for the thorough review. 
> Rgs,
> Panos
> 
> -Original Message-
> From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Jim Schaad
> Sent: Sunday, July 01, 2018 9:34 AM
> To: draft-ietf-ace-coap-...@ietf.org
> Cc: 'ace' 
> Subject: [Ace] Review draft-ietf-ace-coap-est
> 
> * In section 4.1 I have a question about what you are using for payload 
> content encoding.  Part of this might just be a question of how you plan to 
> move from ASN.1 to CBOR at some point in the future.  I think that it would 
> necessitate doing new media-types in that event.  You appear to be doing a 
> CBOR bstr wrapping on the ASN.1 encoding payload.  I don't believe that there 
> is any reason for doing this.  I would expect that the payload would be the 
> ASN.1 w/o any ASN.1.  It is highly possible that I am just mis-reading what 
> the text says and this is what you say.
> 
> * In section 5.0 - As written, the example of doing a query against 
> /.well-known/core does not match my understanding of what would be return.
> It should only return those resources which have the rt field set on them.
> I do not understand why you believe that the following lines MAY be returned. 
>  Clarification of why you think this is true would be appreciated.
> 
> * Section 6 - Is there a need to have all of this description around 
> TLS-unique?  Do you have a reason to believe that people are going get this 
> implemented wrong?
> 
> * Section 7 - I think the figure has an error associated w/ it.  The CA 
> should be tied to the EST Server and not to the Registrar
> 
> * Section 7 - Your language is a bit sloppy around the terms of POP and POP 
> linking.  Unless it is really badly behaved, POP should never be broken by an 
> RA.  The POP is the signature on the request and not tied to the TLS channel. 
>  The POP linking is tied to the TLS channel and is broken by the changing of 
> the TLS sessions (client <-> RA,  RA <-> CA) 
> 
> * Section 7 - It is not clear to me that the SHOULD on reassembly of 
> fragmentation is not a MUST.  I doubt that any EST server is going to be able 
> to deal with getting fragments of requests from a registrar in separate 
> messages.  This would be compounded if the proxy is handling multiple 
> sessions at the same time. 
> 
> * Section 7 - It should be possible that when doing key generation for the 
> protection of the private key to be end-to-end and it should not be necessary 
> for the Proxy to decrypt and then re-encrypt the private key.  It should not 
> matter for this if one does either symmetric or asymmetric encryption of the 
> private key.
> 
> * Section 7 - It is very possible that the private key generation function 
> would be hosted on the proxy and not at the CA.  I think that you might want 
> to describe this as a normal configuration.  (Just spotted this in the 
> Security considerations.  I think it should be here as well.)
> 
> * Section 9.1 - application/multipart-core should not be in the table of 
> items for IANA to register.  This is being done in a different docu

Re: [Ace] Review draft-ietf-ace-coap-est / Removal of CBOR-wrapped ASN.1 ?

2018-12-19 Thread Esko Dijk
Dear Panos & Peter,

On Jim's first point for section 4.1 below (content encoding) - will the 
CBOR-wrapped ASN.1 payload be changed to "pure" ASN.1 payload for the media 
types that are non-multipart?
I agree with Jim that the CBOR wrapping in this case is not needed (since the 
CoAP Content-Format / media type id will tell the receiver how it is encoded 
anyhow).  Also it seems harmful in this case, since an existing CoAP media 
type-plus-encoding is "overloaded" with a second encoding if we allow the 
CBOR-wrapping. Doing this would require registering a new value in the CoAP 
Content-Formats registry, e.g. like "application/csrattrs+cbor" and then it 
would be ok.

I'm asking this because in implementations we now use the CBOR-wrapping and if 
we don't make the change now it will stay that way most likely. And the present 
"EDnote" in the text is not so clear on what will happen.

Best regards
Esko Dijk

-Original Message-
From: Ace  On Behalf Of Panos Kampanakis (pkampana)
Sent: Monday, September 17, 2018 18:56
To: Jim Schaad ; draft-ietf-ace-coap-...@ietf.org
Cc: 'ace' 
Subject: Re: [Ace] Review draft-ietf-ace-coap-est

Hi Jim,
We have now addressed all the issues you brought up in July. The fixes will be 
in the last iteration. 
We will still make some cosmetic updates and post a new version.
Thank you for the thorough review. 
Rgs,
Panos

-Original Message-
From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Jim Schaad
Sent: Sunday, July 01, 2018 9:34 AM
To: draft-ietf-ace-coap-...@ietf.org
Cc: 'ace' 
Subject: [Ace] Review draft-ietf-ace-coap-est

* In section 4.1 I have a question about what you are using for payload content 
encoding.  Part of this might just be a question of how you plan to move from 
ASN.1 to CBOR at some point in the future.  I think that it would necessitate 
doing new media-types in that event.  You appear to be doing a CBOR bstr 
wrapping on the ASN.1 encoding payload.  I don't believe that there is any 
reason for doing this.  I would expect that the payload would be the ASN.1 w/o 
any ASN.1.  It is highly possible that I am just mis-reading what the text says 
and this is what you say.

* In section 5.0 - As written, the example of doing a query against 
/.well-known/core does not match my understanding of what would be return.
It should only return those resources which have the rt field set on them.
I do not understand why you believe that the following lines MAY be returned.  
Clarification of why you think this is true would be appreciated.

* Section 6 - Is there a need to have all of this description around 
TLS-unique?  Do you have a reason to believe that people are going get this 
implemented wrong?

* Section 7 - I think the figure has an error associated w/ it.  The CA should 
be tied to the EST Server and not to the Registrar

* Section 7 - Your language is a bit sloppy around the terms of POP and POP 
linking.  Unless it is really badly behaved, POP should never be broken by an 
RA.  The POP is the signature on the request and not tied to the TLS channel.  
The POP linking is tied to the TLS channel and is broken by the changing of the 
TLS sessions (client <-> RA,  RA <-> CA) 

* Section 7 - It is not clear to me that the SHOULD on reassembly of 
fragmentation is not a MUST.  I doubt that any EST server is going to be able 
to deal with getting fragments of requests from a registrar in separate 
messages.  This would be compounded if the proxy is handling multiple sessions 
at the same time. 

* Section 7 - It should be possible that when doing key generation for the 
protection of the private key to be end-to-end and it should not be necessary 
for the Proxy to decrypt and then re-encrypt the private key.  It should not 
matter for this if one does either symmetric or asymmetric encryption of the 
private key.

* Section 7 - It is very possible that the private key generation function 
would be hosted on the proxy and not at the CA.  I think that you might want to 
describe this as a normal configuration.  (Just spotted this in the Security 
considerations.  I think it should be here as well.)

* Section 9.1 - application/multipart-core should not be in the table of items 
for IANA to register.  This is being done in a different document.  If you want 
this table as a whole then it needs to be moved out of IANA considerations.

* Section 9.2 - please expand this text some.  You might want to look at
https://tools.ietf.org/html/rfc7390#section-6.1 for a template.


Jim


___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace
___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] Review draft-ietf-ace-coap-est

2018-09-17 Thread Panos Kampanakis (pkampana)
Hi Jim,
We have now addressed all the issues you brought up in July. The fixes will be 
in the last iteration. 
We will still make some cosmetic updates and post a new version.
Thank you for the thorough review. 
Rgs,
Panos

-Original Message-
From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Jim Schaad
Sent: Sunday, July 01, 2018 9:34 AM
To: draft-ietf-ace-coap-...@ietf.org
Cc: 'ace' 
Subject: [Ace] Review draft-ietf-ace-coap-est

* In section 4.1 I have a question about what you are using for payload content 
encoding.  Part of this might just be a question of how you plan to move from 
ASN.1 to CBOR at some point in the future.  I think that it would necessitate 
doing new media-types in that event.  You appear to be doing a CBOR bstr 
wrapping on the ASN.1 encoding payload.  I don't believe that there is any 
reason for doing this.  I would expect that the payload would be the ASN.1 w/o 
any ASN.1.  It is highly possible that I am just mis-reading what the text says 
and this is what you say.

* In section 5.0 - As written, the example of doing a query against 
/.well-known/core does not match my understanding of what would be return.
It should only return those resources which have the rt field set on them.
I do not understand why you believe that the following lines MAY be returned.  
Clarification of why you think this is true would be appreciated.

* Section 6 - Is there a need to have all of this description around 
TLS-unique?  Do you have a reason to believe that people are going get this 
implemented wrong?

* Section 7 - I think the figure has an error associated w/ it.  The CA should 
be tied to the EST Server and not to the Registrar

* Section 7 - Your language is a bit sloppy around the terms of POP and POP 
linking.  Unless it is really badly behaved, POP should never be broken by an 
RA.  The POP is the signature on the request and not tied to the TLS channel.  
The POP linking is tied to the TLS channel and is broken by the changing of the 
TLS sessions (client <-> RA,  RA <-> CA) 

* Section 7 - It is not clear to me that the SHOULD on reassembly of 
fragmentation is not a MUST.  I doubt that any EST server is going to be able 
to deal with getting fragments of requests from a registrar in separate 
messages.  This would be compounded if the proxy is handling multiple sessions 
at the same time. 

* Section 7 - It should be possible that when doing key generation for the 
protection of the private key to be end-to-end and it should not be necessary 
for the Proxy to decrypt and then re-encrypt the private key.  It should not 
matter for this if one does either symmetric or asymmetric encryption of the 
private key.

* Section 7 - It is very possible that the private key generation function 
would be hosted on the proxy and not at the CA.  I think that you might want to 
describe this as a normal configuration.  (Just spotted this in the Security 
considerations.  I think it should be here as well.)

* Section 9.1 - application/multipart-core should not be in the table of items 
for IANA to register.  This is being done in a different document.  If you want 
this table as a whole then it needs to be moved out of IANA considerations.

* Section 9.2 - please expand this text some.  You might want to look at
https://tools.ietf.org/html/rfc7390#section-6.1 for a template.


Jim


___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] Review draft-ietf-ace-coap-est

2018-09-13 Thread Jim Schaad
Yes I think that is correct.  I’ll need to review final text at some point but 
what you say below look right.

 

From: Panos Kampanakis (pkampana)  
Sent: Thursday, September 13, 2018 1:29 PM
To: Jim Schaad ; consulta...@vanderstok.org
Cc: draft-ietf-ace-coap-...@ietf.org; 'ace' 
Subject: RE: [Ace] Review draft-ietf-ace-coap-est

 

Hi Jim,

 

Trying to close on this one and update the draft if necessary.

> [JLS]  I do not believe that the wrapping of content with the CBOR binary 
> text wrapping is needed at this point.  If that is needed for the multi-part 
> wrapping, then it is the job of the multi-part wrapping to deal with this 
> problem.  Multipart needs to be able to say I have a multipart of  text, json> neither of which are CBOR objects.  Therefor there is no reason 
> for you to use a CBOR wrapper for this and not just use the binary value.

You are right. We don’t need the CBOR binary wrapping. Originally the multipart 
was not using CBOR either 
https://tools.ietf.org/html/draft-fossati-core-multipart-ct-03 It was just 
using the encoding the length and then included the encoded payload. The draft 
was updated https://tools.ietf.org/html/draft-ietf-core-multipart-ct and to be 
consistent with CBOR follow this new wrapping methodology that leverages CBOR. 
What you are saying is right, but we needed to point to a live draft. 

 

The key and the cert payloads in the multipart conveyed here will be ASN.1 as 
you suggested, binary encoded. The CT ID for the key and cert are defined in 
EST-coaps as 280 and 281. We need to make sure we spell them out in the text 
though to make them clearer. 

 

Does it make sense? 

 

Panos

 

 

From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Jim Schaad
Sent: Wednesday, July 04, 2018 9:30 AM
To: consulta...@vanderstok.org <mailto:consulta...@vanderstok.org> 
Cc: draft-ietf-ace-coap-...@ietf.org <mailto:draft-ietf-ace-coap-...@ietf.org> 
; 'ace' mailto:ace@ietf.org> >
Subject: Re: [Ace] Review draft-ietf-ace-coap-est

 

 

 

From: Peter van der Stok mailto:stokc...@bbhmail.nl> > 
Sent: Wednesday, July 4, 2018 1:53 AM
To: Jim Schaad mailto:i...@augustcellars.com> >
Cc: draft-ietf-ace-coap-...@ietf.org <mailto:draft-ietf-ace-coap-...@ietf.org> 
; 'ace' mailto:ace@ietf.org> >
Subject: Re: [Ace] Review draft-ietf-ace-coap-est

 

Hi Jim,

Many thanks for the review. See our answers below.

* In section 4.1 I have a question about what you are using for payload content 
encoding.  Part of this might just be a question of how you plan to move from 
ASN.1 to CBOR at some point in the future.  I think that it would necessitate 
doing new media-types in that event.  You appear to be doing a CBOR bstr 
wrapping on the ASN.1 encoding payload.  I don't believe that there is any 
reason for doing this.  I would expect that the payload would be the ASN.1 w/o 
any ASN.1.  It is highly possible that I am just mis-reading what the text says 
and this is what you say.



What I wanted to do, and did not express very well.

Keep the ASN.1 structure of the payload; (re-using code)

Use straight binary coding instead of the base64-encoded (30% payload reduction)

Wrap the binary in a CBOR major type 2 h’xxx’ notation. (compatibility with 
multipart)

Not sure if this needs a new media type, the http content-coding and 
transfer-coding registries were not very helpful.



[JLS]  I do not believe that the wrapping of content with the CBOR binary text 
wrapping is needed at this point.  If that is needed for the multi-part 
wrapping, then it is the job of the multi-part wrapping to deal with this 
problem.  Multipart needs to be able to say I have a multipart of  neither of which are CBOR objects.  Therefor there is no reason for you 
to use a CBOR wrapper for this and not just use the binary value.



* In section 5.0 - As written, the example of doing a query against 
/.well-known/core does not match my understanding of what would be return.
It should only return those resources which have the rt field set on them.
I do not understand why you believe that the following lines MAY be returned.  
Clarification of why you think this is true would be appreciated.



Thanks for your reaction, I hesitated between two choices.

*   Provide every line with another rt=ace.est.crts; rt=ace.est.sen; etc.
*   Make them all ace.est.

There are no structure guidelines on rt= value, which complicates things.

Looking forward to your (and others) opinion.



[JLS] This is probably a don’t ask me question because I am not a deployer of 
IoT objects.  I don’t know that there is a good answer for this.  This is 
probably a good question to toss at the CORE WG.


* Section 6 - Is there a need to have all of this description around 
TLS-unique?  Do you have a reason to believe that people are going get this 
implemented wrong?


This come from experience. The implementation we had done 

Re: [Ace] Review draft-ietf-ace-coap-est

2018-09-13 Thread Panos Kampanakis (pkampana)
Hi Jim,

Trying to close on this one and update the draft if necessary.

> [JLS]  I do not believe that the wrapping of content with the CBOR binary 
> text wrapping is needed at this point.  If that is needed for the multi-part 
> wrapping, then it is the job of the multi-part wrapping to deal with this 
> problem.  Multipart needs to be able to say I have a multipart of  text, json> neither of which are CBOR objects.  Therefor there is no reason 
> for you to use a CBOR wrapper for this and not just use the binary value.
You are right. We don’t need the CBOR binary wrapping. Originally the multipart 
was not using CBOR either 
https://tools.ietf.org/html/draft-fossati-core-multipart-ct-03 It was just 
using the encoding the length and then included the encoded payload. The draft 
was updated https://tools.ietf.org/html/draft-ietf-core-multipart-ct and to be 
consistent with CBOR follow this new wrapping methodology that leverages CBOR. 
What you are saying is right, but we needed to point to a live draft.

The key and the cert payloads in the multipart conveyed here will be ASN.1 as 
you suggested, binary encoded. The CT ID for the key and cert are defined in 
EST-coaps as 280 and 281. We need to make sure we spell them out in the text 
though to make them clearer.

Does it make sense?

Panos


From: Ace [mailto:ace-boun...@ietf.org] On Behalf Of Jim Schaad
Sent: Wednesday, July 04, 2018 9:30 AM
To: consulta...@vanderstok.org
Cc: draft-ietf-ace-coap-...@ietf.org; 'ace' 
Subject: Re: [Ace] Review draft-ietf-ace-coap-est



From: Peter van der Stok mailto:stokc...@bbhmail.nl>>
Sent: Wednesday, July 4, 2018 1:53 AM
To: Jim Schaad mailto:i...@augustcellars.com>>
Cc: draft-ietf-ace-coap-...@ietf.org<mailto:draft-ietf-ace-coap-...@ietf.org>; 
'ace' mailto:ace@ietf.org>>
Subject: Re: [Ace] Review draft-ietf-ace-coap-est


Hi Jim,

Many thanks for the review. See our answers below.

* In section 4.1 I have a question about what you are using for payload content 
encoding.  Part of this might just be a question of how you plan to move from 
ASN.1 to CBOR at some point in the future.  I think that it would necessitate 
doing new media-types in that event.  You appear to be doing a CBOR bstr 
wrapping on the ASN.1 encoding payload.  I don't believe that there is any 
reason for doing this.  I would expect that the payload would be the ASN.1 w/o 
any ASN.1.  It is highly possible that I am just mis-reading what the text says 
and this is what you say.



What I wanted to do, and did not express very well.

Keep the ASN.1 structure of the payload; (re-using code)

Use straight binary coding instead of the base64-encoded (30% payload reduction)

Wrap the binary in a CBOR major type 2 h’xxx’ notation. (compatibility with 
multipart)

Not sure if this needs a new media type, the http content-coding and 
transfer-coding registries were not very helpful.



[JLS]  I do not believe that the wrapping of content with the CBOR binary text 
wrapping is needed at this point.  If that is needed for the multi-part 
wrapping, then it is the job of the multi-part wrapping to deal with this 
problem.  Multipart needs to be able to say I have a multipart of  neither of which are CBOR objects.  Therefor there is no reason for you 
to use a CBOR wrapper for this and not just use the binary value.


* In section 5.0 - As written, the example of doing a query against 
/.well-known/core does not match my understanding of what would be return.
It should only return those resources which have the rt field set on them.
I do not understand why you believe that the following lines MAY be returned.  
Clarification of why you think this is true would be appreciated.



Thanks for your reaction, I hesitated between two choices.

  *   Provide every line with another rt=ace.est.crts; rt=ace.est.sen; etc.
  *   Make them all ace.est.

There are no structure guidelines on rt= value, which complicates things.

Looking forward to your (and others) opinion.



[JLS] This is probably a don’t ask me question because I am not a deployer of 
IoT objects.  I don’t know that there is a good answer for this.  This is 
probably a good question to toss at the CORE WG.

* Section 6 - Is there a need to have all of this description around 
TLS-unique?  Do you have a reason to believe that people are going get this 
implemented wrong?


This come from experience. The implementation we had done in the past did not 
implement it correctly, that is why we expanded on the TLS-unique. We will see 
about shrinking the text in the draft.



* Section 7 - I think the figure has an error associated w/ it.  The CA should 
be tied to the EST Server and not to the Registrar


Thank you, we will fix that in the next iteration.



* Section 7 - Your language is a bit sloppy around the terms of POP and POP 
linking.  Unless it is really badly behaved, POP should never be broken by an 
RA.  The POP is the 

Re: [Ace] Review draft-ietf-ace-coap-est

2018-07-09 Thread Jim Schaad
 

 

From: Peter van der Stok  
Sent: Monday, July 9, 2018 1:01 AM
To: Jim Schaad 
Cc: consulta...@vanderstok.org; draft-ietf-ace-coap-...@ietf.org; 'ace' 

Subject: Re: [Ace] Review draft-ietf-ace-coap-est

 

 

* In section 4.1 I have a question about what you are using for payload content 
encoding.  Part of this might just be a question of how you plan to move from 
ASN.1 to CBOR at some point in the future.  I think that it would necessitate 
doing new media-types in that event.  You appear to be doing a CBOR bstr 
wrapping on the ASN.1 encoding payload.  I don't believe that there is any 
reason for doing this.  I would expect that the payload would be the ASN.1 w/o 
any ASN.1.  It is highly possible that I am just mis-reading what the text says 
and this is what you say.



What I wanted to do, and did not express very well.

Keep the ASN.1 structure of the payload; (re-using code)

Use straight binary coding instead of the base64-encoded (30% payload reduction)

Wrap the binary in a CBOR major type 2 h'xxx' notation. (compatibility with 
multipart)

Not sure if this needs a new media type, the http content-coding and 
transfer-coding registries were not very helpful.



[JLS]  I do not believe that the wrapping of content with the CBOR binary text 
wrapping is needed at this point.  If that is needed for the multi-part 
wrapping, then it is the job of the multi-part wrapping to deal with this 
problem.  Multipart needs to be able to say I have a multipart of  neither of which are CBOR objects.  Therefor there is no reason for you 
to use a CBOR wrapper for this and not just use the binary value.

 



You are right of course, the CBOR wrapping is not needed outside the multipart 
media type.
However, CBOR wrapping for all payloads, reduces the choices when decoding the 
payload; They all start the same.
And it adds 2-3 bytes on many.


[JLS]  I don’t follow this at all.  How I read this statement is

I have a binary value and I need to look at the content type to figure out what 
ASN.1 structure it is and decode it.  This is very hard.  So I am going to 
change this to

I need to look at the content type to figure out that I have a CBOR bstring 
value.  It is easy to remove the CBOR bstring value.  I now have a binary value 
and I need to look at the content type to figure out what ASN.1 structure it is 
and decode it.  This is somehow easier.

 

___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] Review draft-ietf-ace-coap-est

2018-07-09 Thread Peter van der Stok
> * In section 4.1 I have a question about what you are using for payload 
> content encoding.  Part of this might just be a question of how you plan to 
> move from ASN.1 to CBOR at some point in the future.  I think that it would 
> necessitate doing new media-types in that event.  You appear to be doing a 
> CBOR bstr wrapping on the ASN.1 encoding payload.  I don't believe that there 
> is any reason for doing this.  I would expect that the payload would be the 
> ASN.1 w/o any ASN.1.  It is highly possible that I am just mis-reading what 
> the text says and this is what you say. 
> 
>  
> 
> What I wanted to do, and did not express very well. 
> 
> Keep the ASN.1 structure of the payload; (re-using code) 
> 
> Use straight binary coding instead of the base64-encoded (30% payload 
> reduction) 
> 
> Wrap the binary in a CBOR major type 2 h'xxx' notation. (compatibility with 
> multipart) 
> 
> Not sure if this needs a new media type, the http content-coding and 
> transfer-coding registries were not very helpful. 
> 
>  
> 
> [JLS]  I do not believe that the wrapping of content with the CBOR binary 
> text wrapping is needed at this point.  If that is needed for the multi-part 
> wrapping, then it is the job of the multi-part wrapping to deal with this 
> problem.  Multipart needs to be able to say I have a multipart of  text, json> neither of which are CBOR objects.  Therefor there is no reason 
> for you to use a CBOR wrapper for this and not just use the binary value. 
> 
> 
> You are right of course, the CBOR wrapping is not needed outside the 
> multipart media type.
> However, CBOR wrapping for all payloads, reduces the choices when decoding 
> the payload; They all start the same.
> And it adds 2-3 bytes on many.
> ___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace


Re: [Ace] Review draft-ietf-ace-coap-est

2018-07-04 Thread Jim Schaad
 

 

From: Peter van der Stok  
Sent: Wednesday, July 4, 2018 1:53 AM
To: Jim Schaad 
Cc: draft-ietf-ace-coap-...@ietf.org; 'ace' 
Subject: Re: [Ace] Review draft-ietf-ace-coap-est

 

Hi Jim,

Many thanks for the review. See our answers below.

* In section 4.1 I have a question about what you are using for payload content 
encoding.  Part of this might just be a question of how you plan to move from 
ASN.1 to CBOR at some point in the future.  I think that it would necessitate 
doing new media-types in that event.  You appear to be doing a CBOR bstr 
wrapping on the ASN.1 encoding payload.  I don't believe that there is any 
reason for doing this.  I would expect that the payload would be the ASN.1 w/o 
any ASN.1.  It is highly possible that I am just mis-reading what the text says 
and this is what you say.



What I wanted to do, and did not express very well.

Keep the ASN.1 structure of the payload; (re-using code)

Use straight binary coding instead of the base64-encoded (30% payload reduction)

Wrap the binary in a CBOR major type 2 h’xxx’ notation. (compatibility with 
multipart)

Not sure if this needs a new media type, the http content-coding and 
transfer-coding registries were not very helpful.



[JLS]  I do not believe that the wrapping of content with the CBOR binary text 
wrapping is needed at this point.  If that is needed for the multi-part 
wrapping, then it is the job of the multi-part wrapping to deal with this 
problem.  Multipart needs to be able to say I have a multipart of  neither of which are CBOR objects.  Therefor there is no reason for you 
to use a CBOR wrapper for this and not just use the binary value.



* In section 5.0 - As written, the example of doing a query against 
/.well-known/core does not match my understanding of what would be return.
It should only return those resources which have the rt field set on them.
I do not understand why you believe that the following lines MAY be returned.  
Clarification of why you think this is true would be appreciated.



Thanks for your reaction, I hesitated between two choices.

*   Provide every line with another rt=ace.est.crts; rt=ace.est.sen; etc.
*   Make them all ace.est.

There are no structure guidelines on rt= value, which complicates things.

Looking forward to your (and others) opinion.



[JLS] This is probably a don’t ask me question because I am not a deployer of 
IoT objects.  I don’t know that there is a good answer for this.  This is 
probably a good question to toss at the CORE WG.


* Section 6 - Is there a need to have all of this description around 
TLS-unique?  Do you have a reason to believe that people are going get this 
implemented wrong?


This come from experience. The implementation we had done in the past did not 
implement it correctly, that is why we expanded on the TLS-unique. We will see 
about shrinking the text in the draft. 



* Section 7 - I think the figure has an error associated w/ it.  The CA should 
be tied to the EST Server and not to the Registrar


Thank you, we will fix that in the next iteration.



* Section 7 - Your language is a bit sloppy around the terms of POP and POP 
linking.  Unless it is really badly behaved, POP should never be broken by an 
RA.  The POP is the signature on the request and not tied to the TLS channel.  
The POP linking is tied to the TLS channel and is broken by the changing of the 
TLS sessions (client <-> RA,  RA <-> CA) 


Very good catch. We will tighten the language in the next iteration.



* Section 7 - It is not clear to me that the SHOULD on reassembly of 
fragmentation is not a MUST.  I doubt that any EST server is going to be able 
to deal with getting fragments of requests from a registrar in separate 
messages.  This would be compounded if the proxy is handling multiple sessions 
at the same time. 


I think that is reasonable. We will address it. 



* Section 7 - It should be possible that when doing key generation for the 
protection of the private key to be end-to-end and it should not be necessary 
for the Proxy to decrypt and then re-encrypt the private key.  It should not 
matter for this if one does either symmetric or asymmetric encryption of the 
private key.



Proxy: you mean Registrar.

[JLS] Yes I meant Registrar.

The wish is understood, we’ll look into it.



* Section 7 - It is very possible that the private key generation function 
would be hosted on the proxy and not at the CA.  I think that you might want to 
describe this as a normal configuration.  (Just spotted this in the Security 
considerations.  I think it should be here as well.)


Yes, right. We need to be crisper on the document that end to end or proxy can 
provide this functionality. We will make sure it is clear in the text. 



* Section 9.1 - application/multipart-core should not be in the table of items 
for IANA to register.  This is being done in a different document.  If you want 
this table as a whole then it ne

Re: [Ace] Review draft-ietf-ace-coap-est

2018-07-04 Thread Peter van der Stok
Hi Jim, 

Many thanks for the review. See our answers below.

* In section 4.1 I have a question about what you are using for payload
content encoding.  Part of this might just be a question of how you plan
to move from ASN.1 to CBOR at some point in the future.  I think that it
would necessitate doing new media-types in that event.  You appear to be
doing a CBOR bstr wrapping on the ASN.1 encoding payload.  I don't
believe that there is any reason for doing this.  I would expect that
the payload would be the ASN.1 w/o any ASN.1.  It is highly possible
that I am just mis-reading what the text says and this is what you say. 

 

What I wanted to do, and did not express very well. 

Keep the ASN.1 structure of the payload; (re-using code) 

Use straight binary coding instead of the base64-encoded (30% payload
reduction) 

Wrap the binary in a CBOR major type 2 h'xxx' notation. (compatibility
with multipart) 

Not sure if this needs a new media type, the http content-coding and
transfer-coding registries were not very helpful. 



* In section 5.0 - As written, the example of doing a query against
/.well-known/core does not match my understanding of what would be
return.
It should only return those resources which have the rt field set on
them.
I do not understand why you believe that the following lines MAY be
returned.  Clarification of why you think this is true would be
appreciated. 

 

Thanks for your reaction, I hesitated between two choices. 

* Provide every line with another rt=ace.est.crts; rt=ace.est.sen;
etc.
* Make them all ace.est.

There are no structure guidelines on rt= value, which complicates
things. 

Looking forward to your (and others) opinion. 



* Section 6 - Is there a need to have all of this description around
TLS-unique?  Do you have a reason to believe that people are going get
this implemented wrong? 


This come from experience. The implementation we had done in the past
did not implement it correctly, that is why we expanded on the
TLS-unique. We will see about shrinking the text in the draft.  



* Section 7 - I think the figure has an error associated w/ it.  The CA
should be tied to the EST Server and not to the Registrar 


Thank you, we will fix that in the next iteration. 



* Section 7 - Your language is a bit sloppy around the terms of POP and
POP linking.  Unless it is really badly behaved, POP should never be
broken by an RA.  The POP is the signature on the request and not tied
to the TLS channel.  The POP linking is tied to the TLS channel and is
broken by the changing of the TLS sessions (client <-> RA,  RA <-> CA)  


Very good catch. We will tighten the language in the next iteration. 



* Section 7 - It is not clear to me that the SHOULD on reassembly of
fragmentation is not a MUST.  I doubt that any EST server is going to be
able to deal with getting fragments of requests from a registrar in
separate messages.  This would be compounded if the proxy is handling
multiple sessions at the same time.  


I think that is reasonable. We will address it.  



* Section 7 - It should be possible that when doing key generation for
the protection of the private key to be end-to-end and it should not be
necessary for the Proxy to decrypt and then re-encrypt the private key. 
It should not matter for this if one does either symmetric or asymmetric
encryption of the private key. 

 

Proxy: you mean Registrar. 

The wish is understood, we'll look into it. 



* Section 7 - It is very possible that the private key generation
function would be hosted on the proxy and not at the CA.  I think that
you might want to describe this as a normal configuration.  (Just
spotted this in the Security considerations.  I think it should be here
as well.) 


Yes, right. We need to be crisper on the document that end to end or
proxy can provide this functionality. We will make sure it is clear in
the text.  



* Section 9.1 - application/multipart-core should not be in the table of
items for IANA to register.  This is being done in a different document.
 If you want this table as a whole then it needs to be moved out of IANA
considerations. 

 

Absolutely right. Content-format is also specified I multipart-ct; did
not see that. Will remove the entry. 



* Section 9.2 - please expand this text some.  You might want to look at
https://tools.ietf.org/html/rfc7390#section-6.1 for a template. 

 

Will do 

 

Thanks Jim, This really helps to improve the document 

Peter, Panos

Jim Schaad schreef op 2018-07-01 15:33:

>___
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace