Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Ludwig Seitz
On 19/12/2018 21:22, Jim Schaad wrote: In step (4) you tie the expiry of the token to the attacker getting hold of the key. What happens if the attacker gets hold of the pop key before the token expires? If it is detected the AS would revoke the token. Then the client _could_ use client

Re: [Ace] Call for adoption of draft-palombini-ace-key-groupcomm

2018-12-19 Thread Roman Danyliw
Hello! Per the IETF 103 face-to-face meeting and the call on the mailing list, there is support to adopt this draft (draft-palombini-ace-key-groupcomm). Authors: please submit this draft as a -00 WG document (draft-ietf-ace-key-groupcomm-00). Regards, Roman and Jim > -Original

Re: [Ace] Call for adoption of draft-tiloca-ace-oscoap-joining

2018-12-19 Thread Roman Danyliw
Hello! Per the IETF 103 face-to-face meeting and the call on the mailing list, there is support to adopt this draft (draft-tiloca-ace-oscoap-joining). Authors: please submit this draft as a -00 WG document (draft-ietf-ace-oscoap-joining-00). Regards, Roman and Jim > -Original

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Jim Schaad
> -Original Message- > From: Ludwig Seitz > Sent: Wednesday, December 19, 2018 5:24 AM > To: Hannes Tschofenig ; Stefanie Gerdes > ; Jim Schaad ; ace@ietf.org > Subject: Re: [Ace] Security of the Communication Between C and RS > > On 19/12/2018 14:04, Hannes Tschofenig wrote: > >

Re: [Ace] Review draft-ietf-ace-coap-est / Removal of CBOR-wrapped ASN.1 ?

2018-12-19 Thread Peter van der Stok
Hi esko, apologies for being unclear. The CBOR wrapping is removed. It is only present for response of server key generation /skg Peter Esko Dijk schreef op 2018-12-19 13:32: > Dear Panos & Peter, > > On Jim's first point for section 4.1 below (content encoding) - will the > CBOR-wrapped

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Ludwig Seitz
On 19/12/2018 14:04, Hannes Tschofenig wrote: Thanks, Ludwig. The list of steps below help me to understand the concern. 1.) C obtains token and pop-key from AS 2.) C transmits token to RS and sets up secure communication (e.g. DTLS-PSK) using the pop-key 3.) C sends secure requests to

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Hannes Tschofenig
Thanks, Ludwig. The list of steps below help me to understand the concern. 1.) C obtains token and pop-key from AS 2.) C transmits token to RS and sets up secure communication (e.g. DTLS-PSK) using the pop-key 3.) C sends secure requests to the RS 4.) token expires, an attacker manages to

Re: [Ace] Review draft-ietf-ace-coap-est / Removal of CBOR-wrapped ASN.1 ?

2018-12-19 Thread Esko Dijk
Dear Panos & Peter, On Jim's first point for section 4.1 below (content encoding) - will the CBOR-wrapped ASN.1 payload be changed to "pure" ASN.1 payload for the media types that are non-multipart? I agree with Jim that the CBOR wrapping in this case is not needed (since the CoAP

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Ludwig Seitz
On 19/12/2018 12:46, Stefanie Gerdes wrote: Hi Hannes, On 12/19/2018 12:36 PM, Hannes Tschofenig wrote: Hi Steffi, Are you focused on token expiry or the case where a token + symmetric key has been leaked? I am talking about the expiry of the keying material for RS that AS provides to C.

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Stefanie Gerdes
Hi Hannes, On 12/19/2018 12:36 PM, Hannes Tschofenig wrote: > Hi Steffi, > > Are you focused on token expiry or the case where a token + symmetric key has > been leaked? I am talking about the expiry of the keying material for RS that AS provides to C. > > Is the threat you are describing

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Hannes Tschofenig
Hi Steffi, Are you focused on token expiry or the case where a token + symmetric key has been leaked? Is the threat you are describing the case where the client uses DTLS/TLS with the RS (potentially long after a token has been presented), or the case where the client contacts the RS and

Re: [Ace] Security of the Communication Between C and RS

2018-12-19 Thread Stefanie Gerdes
Hi Hannes, On 12/18/2018 04:26 PM, Hannes Tschofenig wrote: > Hi Steffi, > >> In OAuth, the expires_in field is usually used to inform the client how long >> the access token is valid. If the client uses the access token in a request >> after the token expired, the RS will reject the request,