Cigdem and Daniel,

Thanks for working to get this resolved.  It will be one less thing for me
to comment on :)

-Ben

On Tue, Apr 13, 2021 at 08:57:53AM -0400, Daniel Migault wrote:
> Thanks for the update, that works for me.
> 
> Yours,
> Daniel
> 
> On Tue, Apr 13, 2021 at 8:44 AM Cigdem Sengul <cigdem.sen...@gmail.com>
> wrote:
> 
> > Hello Daniel,
> > I propose the following change to clarify the TLS use - if you are happy
> > with it, I will update the document:
> >
> > To provide communication confidentiality and RS authentication to MQTT
> > clients, TLS
> >
> >    is used, and TLS 1.3 [RFC8446] is RECOMMENDED.  This document makes
> >
> >    the same assumptions as Section 4 of the ACE framework
> >
> >    [I-D.ietf-ace-oauth-authz] regarding Client and RS registration with
> >
> >    the AS and setting up keying material.  While the Client-Broker
> >
> >    exchanges are only over MQTT, the required Client-AS and RS-AS
> >
> >    interactions are described for HTTPS-based communication [RFC7230],
> >
> >    using 'application/ace+json' content type, and unless otherwise
> >
> >    specified, using JSON encoding. The Client-AS and RS-AS MAY also use
> >    protocols other than HTTP, e.g.  Constrained Application Protocol
> >    (CoAP) [RFC7252] or MQTT; it is recommended
> >     that TLS is used to secure the communication channels between
> > Client-AS and RS-AS."
> >
> > Since it is in this paragraph, one thing that Francesca brought up to do
> > is to register the 'application/ace+json' content type.
> > Kind regards,
> > --Cigdem
> >
> > On Fri, Mar 5, 2021 at 9:11 PM Daniel Migault <daniel.migault=
> > 40ericsson....@dmarc.ietf.org> wrote:
> >
> >> Hi,
> >>
> >>
> >>
> >> Now that the authz document is being consolidated, I do have some minor
> >> concerns regarding the recommendations mentioned in the profile documents,
> >> that might require an additional update.
> >>
> >> The update to the authz document indicates more more clearly than before
> >> that profiles need to provide some recommendations for the RS – AS
> >> communication.
> >>
> >>
> >>
> >> “””
> >>
> >> Profiles MUST  specify for introspection a communication security
> >> protocol RECOMMENDED to be used between RS and AS that provides the
> >> features required above. “””
> >>
> >>
> >>
> >> It seems to me the MQTT profile text makes it pretty clear that TLS is
> >> recommended for all communications but I am wondering if additional
> >> clarification would be beneficial – see below. That said I agree this is a
> >> very minor point in this case that could be handled by the RFC editor.
> >>
> >> For the OSCORE or DTLS profiles, unless I am missing the RS – AS
> >> recommendations in the documents , it seems to me it has been omitted and
> >> needs to be added -- see below.
> >>
> >>
> >>
> >>
> >>
> >> Yours,
> >>
> >> Daniel
> >>
> >>
> >>
> >> ## MQTT - draft-ietf-ace-mqtt-tls-profile-10
> >>
> >>
> >>
> >> “””
> >>
> >>    To provide communication confidentiality and RS authentication, TLS
> >>
> >>    is used, and TLS 1.3 [RFC8446] is RECOMMENDED.  This document makes
> >>
> >>    the same assumptions as Section 4 of the ACE framework
> >>
> >>    [I-D.ietf-ace-oauth-authz] regarding Client and RS registration with
> >>
> >>    the AS and setting up keying material.  While the Client-Broker
> >>
> >>    exchanges are only over MQTT, the required Client-AS and RS-AS
> >>
> >>    interactions are described for HTTPS-based communication [RFC7230],
> >>
> >>    using 'application/ace+json' content type, and unless otherwise
> >>
> >>    specified, using JSON encoding.
> >>
> >> “””
> >>
> >>
> >>
> >> I am wondering if that would not be more appropriated to specify in the
> >> first line RS and AS authentication or simply authentication.
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >>    - OSCORE draft-ietf-ace-oscore-profile-16
> >>
> >> “””
> >>
> >> This
> >>
> >>    profile RECOMMENDS the use of OSCORE between client and AS, to reduce
> >>
> >>    the number of libraries the client has to support, but other
> >>
> >>    protocols fulfilling the security requirements defined in section 5
> >>
> >>    of [I-D.ietf-ace-oauth-authz] (such as TLS or DTLS) MAY be used as
> >>
> >>    well.
> >>
> >> “””
> >>
> >>
> >>
> >>
> >>    - DTLS draft-ietf-ace-dtls-authorize-15
> >>
> >>
> >>
> >> “””
> >>
> >> It is RECOMMENDED that the client
> >>
> >>    uses DTLS with the same keying material to secure the communication
> >>
> >>    with the authorization server, proving possession of the key as part
> >>
> >>    of the token request.  Other mechanisms for proving possession of the
> >>
> >>    key may be defined in the future.
> >>
> >> “””
> >>
> >>
> >> _______________________________________________
> >> Ace mailing list
> >> Ace@ietf.org
> >> https://www.ietf.org/mailman/listinfo/ace
> >>
> > _______________________________________________
> > Ace mailing list
> > Ace@ietf.org
> > https://www.ietf.org/mailman/listinfo/ace
> >
> 
> 
> -- 
> Daniel Migault
> Ericsson

> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace

_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to