Hi Roman,

Thanks for your review.

As I was re-reading the reviews I spotted this comment:

>  (14) (Editorial)  Page 8, Section 4, Per "Replay can also be avoided if a 
> sub-key is derived from a shared secret that is specific to the instance of 
> the PoP demonstration."  PoP is spelled out everywhere else in this draft but 
> here.  Yes, the acronym is defined, but for readability, I recommend against 
> it using it and consistently spelling it out here too.

I believe the current text is a bit confusing. Here is what it says:

Proof of possession via encrypted symmetric secrets is subject to replay 
attacks.
This attack can, for example, be avoided when a signed nonce or challenge is 
used
since the recipient can use a distinct nonce or challenge for each interaction.
Replay can also be avoided if a sub-key is derived from a shared secret
that is specific to the instance of the proof-of-possession demonstration.

This somehow gives the impression that replay attacks are only a concern for 
symmetric key techniques.
Of course, this is not true. Furthermore, the text gives the impression that 
this attack is actually
something that can be covered within the CWT-PoP token spec itself. This is 
also not the case.

For this reason I am suggesting to change the paragraph to:
"
CBOR Web Tokens with proof-of-possession keys are used in context of an 
architecture,
such as ACE-OAuth [REF], where protocols are used by a presenter to request 
these tokens and
to subsequently use them with recipients. To avoid replay attacks when the 
proof-of-possession tokens
are sent to presenters a security protocol, which uses nonces or timestamps, 
has to be utilized.
Note that a discussion of the architecture or specific protocols CWT 
proof-of-possession tokens
are used with are outside the scope of this specification. "

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are 
confidential and may also be privileged. If you are not the intended recipient, 
please notify the sender immediately and do not disclose the contents to any 
other person, use it for any purpose, or store or copy the information in any 
medium. Thank you.

_______________________________________________
Ace mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ace

Reply via email to