Hi Jim, Thank you for your review comments. We agree with all your points, and have opened issues: https://github.com/ace-wg/ace-oscore-profile/issues to get this fixed.
Inline some detailed answer. Thanks, Francesca On 22/10/2018, 21:09, "Jim Schaad" <[email protected]> wrote: * Section 1 - I understand the reasoning behind having the server send back a nonce, although it would be good to have a description someplace about why this is being done. (I would also make it optional as not all RS need to do this.) I do not understand the reasoning behind having the client send a nonce to the server. FP: The motivation for the nonce construction was in the security considerations, but I agree that having it in the Protocol Overview makes sense, so I opened an issue to fix that. The reason behind having the client create a nonce is that we are protecting against an attacker replaying an old RS message (containing an old nonce), which would provoke the creation of an old security context on the Client, and reuse of keys and nonces for a different (new) message. * Section 3.1 - This is more general than the section, but you should not use the URI path in the text, instead you should be using the name that is in the authz document. FP: Agreed, issue opened to fix this. * Section 3.2 - Does it really make sense to use 'COSE_Key' to transport the key data? Would a different field name be better? FP: This was brought up several times, so we will make this change now. * Section 3.2 - Please provide a justification for the requirement that the ids must be unique over the set of all clients and RS. I can see that the client ids need to be unique on a single RS and RS ids need to be unique for any given client but not the broader statement. FP: You are right, this requirement is too wide. We will replace with your suggestion. * Please add an explicit section on when a RS and a client should discard the security context. FP: Ok we will add this. As mentioned in the issue, I have now only this 3 cases in mind: Partial IV space ends (either C or RS); the kid context on the RS side does not match with N1 (RS); C receives a number of Unauthorized (C), although that is a consideration/recommendations, details would be application specific. Do you see any other case relevant for this section? * Section 6 - Ok I'll bite - how does not echoing the nonce allow for a man-in-the-middle attack given that the salt and shared secret are still going to be known only to the C and RS and not to the MITM. I can see a DOS attack being made, but that can be done even without this just by causing the response to never be delivered. FP: Ok so our mistake here is to use the term MitM, so to solve this we will replace with "on-path attacker". The following sentence should be correct with that fix "Moreover, the client echoes the nonce created by the RS, which verifies it before deriving the Security Context, and this protects against an adversary acting as an on path attacker and substituting the nonce in transit from client to RS to provoke the creation of different Security Contexts in the client and RS." Yes this is a DOS, but could also lead to reuse of keys and nonces, as mentioned before. * Appendix - I am not sure that I think that the EDHOC profile should be in this document as oppose to being in it's own document. The fact that we have not even tried to get this to work in any of the interop tests means that I am less sure that it is well baked. FP: Agreed, we will remove this from this document and move it to its own document Jim > -----Original Message----- > From: Ace <[email protected]> On Behalf Of Jim Schaad > Sent: Monday, October 8, 2018 2:35 PM > To: [email protected] > Subject: [Ace] WGLC for draft-ietf-ace-oscore-profile > > The chairs believe that the set of documents dealing with the OAuth > framework for constrained environments is nearing the point that we should > be able to advance it to the IESG for publication. We therefore want to > have a full list of issues that need to be dealt with at the Bangkok > meeting. > > This starts a 2 week WGLC for draft-ietf-ace-oscore-profile > > We know that the following issues are outstanding: > > draft-ietf-ace-oscore-profile: > * No current known issues > > > Jim & Roman > > > _______________________________________________ > Ace mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/ace _______________________________________________ Ace mailing list [email protected] https://www.ietf.org/mailman/listinfo/ace
