On 7/21/2016 5:29 AM, Ludwig Seitz wrote:
On 2016-07-21 11:04, Michael Richardson wrote:

Why will ACE succeed when DICE failed?
Does ACE now have some knowledge or mechanism that DICE couldn't have created
because it was out of scope?


ACE is (also) about authorization, which DICE wasn't. A compromised lightbulb might well have the possibility to talk to a door lock (using it's group key), but it would lack the authorization to do anything with the lock.

IMHO that's what ACE add that DICE didn't have (and wasn't chartered to have).

Hi Ludwig -

Sorry - you are incorrect.

The group key is also the authorization key in the model proposed. Any entity that holds that key can forge a message that can cause the action authorized by the issuance of that key. In your example, assuming that the door lock and the lightbulb share the same group key, then compromising the lightbulb allows you to control the door lock.

In general, authentication comes with the key that you have - authorization is then tied to that key. In DTLS (as in TLS), your session key is also your authorization key once your TLS session is tied to a particular identity (e.g. via an HTTP login, via a client cert exchange, via OAuth).

So - cosmetic differences only.

Mike







/Ludwig




_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace


_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to