Discussion:
[core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap
Jaime Jiménez
2017-11-23 16:59:13 UTC
Permalink
Dear all,

The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.

Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.

Target to end the WGA is 14th of December.

Ciao,
- - Jaime Jiménez
peter van der Stok
2017-11-24 07:52:11 UTC
Permalink
Hi CoRE,

I support this draft.
It provides a basic efficient solution to the multicast problem.
No review from me yet, but that will come.

Peter
Post by Jaime Jiménez
Dear all,
The draft on "Secure group communication for CoAP" (
draft-tiloca-core-multicast-oscoap [1] ) had in room consensus for
adoption during IETF99 already, now we are clear to confirm it on the
mailing list.
Please reply to the list with your comments, including although not
limited to whether or not you support adoption. Non-authors are
especially encouraged to comment.
Target to end the WGA is 14th of December.
Ciao,
- - Jaime Jiménez
------
[1] https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/
_______________________________________________
core mailing list
https://www.ietf.org/mailman/listinfo/core
Rahul Jadhav
2017-11-24 10:04:15 UTC
Permalink
_______________________________________________
core mailing list
***@ietf.org
https://www.ietf.org/mailman/listinfo/core
Beck, Stefan
2017-11-24 14:26:26 UTC
Permalink
+1

I support adoption and continue to review it



Stevie



From: core [mailto:core-***@ietf.org] On Behalf Of Rahul Jadhav
Sent: Friday, November 24, 2017 11:04 AM
To: Jaime Jiménez <***@ericsson.com>
Cc: ***@ietf.org WG (***@ietf.org) <***@ietf.org>; ji-***@uni-due.de
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap



I support adopting this draft. OSCORE support for group communication will be needed.

I ll review this draft.



Regards,

Rahul



On 11/24/2017 00:59, <mailto:***@ericsson.com> Jaime Jiménez wrote:

Dear all,



The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap <https://emea01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Fdraft-tiloca-core-multicast-oscoap%2F&data=02%7C01%7C%7C51083f44d1b4475a074108d53322befa%7Cec1ca250c2344d56a76b7dfb9eee0c46%7C0%7C0%7C636471146685759410&sdata=ajs0YdCh3JjoxVvcrFlNkmsnfVevytYUc5CYWOZvC2c%3D&reserved=0> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.



Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.



Target to end the WGA is 14th of December.



Ciao,

- - Jaime Jiménez
Jim Schaad
2017-12-02 23:15:00 UTC
Permalink
I believe that this work needs to be done. Yes adopt it



From: core [mailto:core-***@ietf.org] On Behalf Of Jaime Jiménez
Sent: Thursday, November 23, 2017 8:59 AM
To: ***@ietf.org WG (***@ietf.org) <***@ietf.org>
Cc: ji-***@uni-due.de
Subject: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap



Dear all,



The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap <https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.



Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.



Target to end the WGA is 14th of December.



Ciao,

- - Jaime Jiménez
Esko Dijk
2017-12-04 13:35:10 UTC
Permalink
I also support the adoption of this draft as a work item for CoRE. Below are the results of a quick review, also.

Best regards
Esko Dijk


Overall comments – or work that the WG could take up next
· Detailed example with message sizes would be useful. Since it’s important for multicast over 6lowpan performance that the IPv6 packets stay small enough (one 802.15.4 frame). At this moment, I can’t judge that yet easily based on the draft.
· Normally, for applications (e.g. Building automation and lighting) groups do need a stable and non-random group ID, that identifies the group over time even as changes occur, e.g. members added/removed. The “Gid” in the draft however changes. There could be some text added to explain how Gid is linked to a stable ID. E.g., this could be configured by the Group Manager. The stable group ID is then not used over-the-wire for multicast OSCORE.
· There is normative text in the Appendices; it could be clarified what the status of this is. E.g. only normative if one chooses to implement the optional element described in the Appendix?
I have a preference for avoiding normative text in the Appendices, but I’m curious to hear what others think.
· The text sometimes suggests that a secure group context is linked to one and only one multicast IP address. In practice, there may be more variety – e.g. one multicast IP address plus one or more unicast IP addresses to which the group message is subsequently delivered. E.g. repeat of the group message to members which did not get it yet. The proposed solution could be reviewed with that view in mind, that there may be multiple (multicast/unicast) IP destination addresses to which a group message will be sent. I did not do that yet; can do so in a future in-depth review.

Section 2.1
Some things here are listed as out of scope, but they do come back later in the doc – such as forward security and backward security , which are addressed I think – certainly not out of scope.

Section 3
" Gid MUST be random " -> seems to contradict Appendix B which uses an Epoch counter in the Gid. Should it say “MUST have a random component” ?

Appendices

* Appendix B, a concrete example instance is missing. E.g. “w3fj90f0a_0042” or its bstr equivalent (just guessing here to the format)
* Appendix C, is this an example blueprint of how to do it – fully optional to follow or not follow this?

Minor

* ligthing -> lighting
* enpoint -> endpoint
* Pg 25 , [I-D.ietf-ace-dtls-authorize] reference breaks across line and as such becomes non-searchable in the browser. And I like these refs to be searchable 😉





From: core [mailto:core-***@ietf.org] On Behalf Of Jaime Jiménez
Sent: Thursday, November 23, 2017 17:59
To: ***@ietf.org WG (***@ietf.org) <***@ietf.org>
Cc: ji-***@uni-due.de
Subject: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Dear all,

The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.

Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.

Target to end the WGA is 14th of December.

Ciao,
- - Jaime Jiménez


________________________________
The information contained in this email may be confidential and/or legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this email is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original email.
Marco Tiloca
2018-03-05 22:18:10 UTC
Permalink
Hello Esko,

Thanks for your support and comments, we have considered them when
producing the latest version of the draft [1].

Please, find in line some answers to your comments.

Best,
/Marco

[1] https://tools.ietf.org/html/draft-ietf-core-oscore-groupcomm-01
Post by Esko Dijk
I also support the adoption of this draft as a work item for CoRE.
Below are the results of a quick review, also.
 
Best regards
Esko Dijk
 
 
Overall comments – or work that the WG could take up next
·         Detailed example with message sizes would be useful. Since
it’s important for multicast over 6lowpan performance that the IPv6
packets stay small enough (one 802.15.4 frame). At this moment, I
can’t judge that yet easily based on the draft.
[MT] We have now included detailed examples in Sections 3.1 (Request)
and Section 3.2 (Response).
Post by Esko Dijk
·         Normally, for applications (e.g. Building automation and
lighting) groups do need a stable and non-random group ID, that
identifies the group over time even as changes occur, e.g. members
added/removed. The “Gid” in the draft however changes. There could be
some text added to explain how Gid is linked to a stable ID. E.g.,
this could be configured by the Group Manager. The stable group ID is
then not used over-the-wire for multicast OSCORE.
[MT] It is true that the Gid in this draft changes over time, especially
upon renewing the group keying material, and the Group Manager is the
only responsible for managing its value update. However, this Gid has to
be intended as the identifier of the OSCORE “security group”, including
as members the endpoints that share the same Common Security Context.

[MT] As you say, applications do rely on a stable and non-random group
ID, which is not used over-the-wire for group OSCORE, and instead
identifies an “application group” having as members the endpoints that
participate in a same group application. There is no relation between
this application-level group ID and the OSCORE Gid defined in this
draft. However, one may possibly map multiple “application groups” to
the same “security group”.

[MT] In order to clarify this point, we included also a definition of
“Group” and “Group ID” in Section 1.1.
Post by Esko Dijk
·         There is normative text in the Appendices; it could be
clarified what the status of this is. E.g. only normative if one
chooses to implement the optional element described in the Appendix?I
have a preference for avoiding normative text in the Appendices, but
I’m curious to hear what others think.
[MT] We relaxed the text in Appendices to avoid normative references,
with the exception of a “NOT RECOMMENDED” in current Appendix F “No
Verification of Signatures”.
Post by Esko Dijk
·         The text sometimes suggests that a secure group context is
linked to one and only one multicast IP address. In practice, there
may be more variety – e.g. one multicast IP address plus one or more
unicast IP addresses to which the group message is subsequently
delivered. E.g. repeat of the group message to members which did not
get it yet. The proposed solution could be reviewed with that view in
mind, that there may be multiple (multicast/unicast) IP destination
addresses to which a group message will be sent. I did not do that
yet; can do so in a future in-depth review.
[MT] Thanks, that’s a very good comment. We’ll think more on the
possible view you propose. It should be fine as long as a recipient is
able to retrieve the right group Security Context, by using the Gid.
Post by Esko Dijk
 
Section 2.1
Some things here are listed as out of scope, but they do come back
later in the doc – such as forward security and backward security ,
which are addressed I think – certainly not out of scope.
[MT] Group OSCORE does not ensure forward security and backward security
itself. Instead, they are entrusted to the specifying group rekeying
protocol enforced by the Group Manager. The specific rekeying protocol
if out of scope for Group OSCORE, which however recommends the use of
one able to ensure backward and forward security in the group.
Post by Esko Dijk
 
Section 3
" Gid MUST be random " -> seems to contradict Appendix B which uses an
Epoch counter in the Gid.  Should it say “MUST have a random component” ?
[MT] Right, now fixed (in current Appendix C).
Post by Esko Dijk
 
Appendices
* Appendix B, a concrete example instance is missing. E.g.
“w3fj90f0a_0042” or its bstr equivalent  (just guessing here to
the format)
[MT] We added an example, in current Appendix C.
Post by Esko Dijk
*
* Appendix C, is this an example blueprint of how to do it – fully
optional to follow or not follow this?
[MT] We relaxed the text in current Appendix D, as for the time being it
is intended to be a guideline example.
Post by Esko Dijk
*
 
Minor
* ligthing -> lighting
* enpoint  -> endpoint
* Pg 25 , [I-D.ietf-ace-dtls-authorize] reference breaks across line
and as such becomes non-searchable in the browser. And I like
these refs to be searchable 😉
 
 
 
 
 
*Sent:* Thursday, November 23, 2017 17:59
*Subject:* [core] 🔔 WG Call for Adoption on
draft-tiloca-core-multicast-oscoap
 
Dear all,
 
The draft on "Secure group communication for CoAP"
( draft-tiloca-core-multicast-oscoap
<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> )
had in room consensus for adoption during IETF99 already, now we are
clear to confirm it on the mailing list. 
 
Please reply to the list with your comments, including although
not limited to whether or not you support adoption. Non-authors are
especially encouraged to comment.
 
Target to end the WGA is 14th of December.
 
Ciao,
- - Jaime Jiménez
 
------------------------------------------------------------------------
The information contained in this email may be confidential and/or
legally protected under applicable law. The message is intended solely
for the addressee(s). If you are not the intended recipient, you are
hereby notified that any use, forwarding, dissemination, or
reproduction of this email is strictly prohibited and may be unlawful.
If you are not the intended recipient, please contact the sender by
return e-mail and destroy all copies of the original email.
_______________________________________________
core mailing list
https://www.ietf.org/mailman/listinfo/core
--
Marco Tiloca, PhD
Research Institutes of Sweden
RISE ICT/SICS
Isafjordsgatan 22 / Kistagången 16
SE-164 40 Kista (Sweden)
Phone: +46 (0)70 60 46 501
https://www.sics.se

The RISE institutes Innventia, SP and Swedish ICT
have merged in order to become a stronger research
and innovation partner for businesses and society.

SICS Swedish ICT AB, has now changed name to RISE SICS AB.
Esko Dijk
2018-03-07 08:29:36 UTC
Permalink
Thanks Marco,

This update solves the issues I think and answers my questions, except for the randomness in the Gid: “A Gid MUST have a random component and be long enough, in order to achieve a negligible probability of collisions between Group Identifiers from different Group Managers”; and Appendix C.

The example Appendix C uses a single random byte. Most people would think the collision probability is quite high in this case; so how can this choice satisfy the requirement? Maybe in this example the Group Managers pick a random value and then mutually verify that there are no collissions?

The name “Group Epoch” could be slightly confusing here – Appendix C states the epoch applies to a single group. However the example there shows the epoch applies to all groups from the same Group Manager, or in other words the epoch *is* the group. (Because there is no thing like “Group ID” in the example, only GM random byte and Group Epoch bytes.) Was it intended to add a byte or so for “Group ID” ? So that each group can have its own epoch counter.

Esko



From: Marco Tiloca <***@ri.se>
Sent: Monday, March 5, 2018 23:18
To: Esko Dijk <***@philips.com>; Jaime Jiménez <***@ericsson.com>; ***@ietf.org WG (***@ietf.org) <***@ietf.org>
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap


Hello Esko,



Thanks for your support and comments, we have considered them when producing the latest version of the draft [1].



Please, find in line some answers to your comments.



Best,

/Marco



[1] https://tools.ietf.org/html/draft-ietf-core-oscore-groupcomm-01

On 2017-12-04 14:35, Esko Dijk wrote:
I also support the adoption of this draft as a work item for CoRE. Below are the results of a quick review, also.

Best regards
Esko Dijk


Overall comments – or work that the WG could take up next
· Detailed example with message sizes would be useful. Since it’s important for multicast over 6lowpan performance that the IPv6 packets stay small enough (one 802.15.4 frame). At this moment, I can’t judge that yet easily based on the draft.


[MT] We have now included detailed examples in Sections 3.1 (Request) and Section 3.2 (Response).


· Normally, for applications (e.g. Building automation and lighting) groups do need a stable and non-random group ID, that identifies the group over time even as changes occur, e.g. members added/removed. The “Gid” in the draft however changes. There could be some text added to explain how Gid is linked to a stable ID. E.g., this could be configured by the Group Manager. The stable group ID is then not used over-the-wire for multicast OSCORE.


[MT] It is true that the Gid in this draft changes over time, especially upon renewing the group keying material, and the Group Manager is the only responsible for managing its value update. However, this Gid has to be intended as the identifier of the OSCORE “security group”, including as members the endpoints that share the same Common Security Context.

[MT] As you say, applications do rely on a stable and non-random group ID, which is not used over-the-wire for group OSCORE, and instead identifies an “application group” having as members the endpoints that participate in a same group application. There is no relation between this application-level group ID and the OSCORE Gid defined in this draft. However, one may possibly map multiple “application groups” to the same “security group”.

[MT] In order to clarify this point, we included also a definition of “Group” and “Group ID” in Section 1.1.


· There is normative text in the Appendices; it could be clarified what the status of this is. E.g. only normative if one chooses to implement the optional element described in the Appendix?I have a preference for avoiding normative text in the Appendices, but I’m curious to hear what others think.

[MT] We relaxed the text in Appendices to avoid normative references, with the exception of a “NOT RECOMMENDED” in current Appendix F “No Verification of Signatures”.


· The text sometimes suggests that a secure group context is linked to one and only one multicast IP address. In practice, there may be more variety – e.g. one multicast IP address plus one or more unicast IP addresses to which the group message is subsequently delivered. E.g. repeat of the group message to members which did not get it yet. The proposed solution could be reviewed with that view in mind, that there may be multiple (multicast/unicast) IP destination addresses to which a group message will be sent. I did not do that yet; can do so in a future in-depth review.


[MT] Thanks, that’s a very good comment. We’ll think more on the possible view you propose. It should be fine as long as a recipient is able to retrieve the right group Security Context, by using the Gid.



Section 2.1
Some things here are listed as out of scope, but they do come back later in the doc – such as forward security and backward security , which are addressed I think – certainly not out of scope.


[MT] Group OSCORE does not ensure forward security and backward security itself. Instead, they are entrusted to the specifying group rekeying protocol enforced by the Group Manager. The specific rekeying protocol if out of scope for Group OSCORE, which however recommends the use of one able to ensure backward and forward security in the group.



Section 3
" Gid MUST be random " -> seems to contradict Appendix B which uses an Epoch counter in the Gid. Should it say “MUST have a random component” ?


[MT] Right, now fixed (in current Appendix C).



Appendices

* Appendix B, a concrete example instance is missing. E.g. “w3fj90f0a_0042” or its bstr equivalent (just guessing here to the format)


[MT] We added an example, in current Appendix C.



*
* Appendix C, is this an example blueprint of how to do it – fully optional to follow or not follow this?


[MT] We relaxed the text in current Appendix D, as for the time being it is intended to be a guideline example.



*

Minor

* ligthing -> lighting
* enpoint -> endpoint
* Pg 25 , [I-D.ietf-ace-dtls-authorize] reference breaks across line and as such becomes non-searchable in the browser. And I like these refs to be searchable 😉





From: core [mailto:core-***@ietf.org] On Behalf Of Jaime Jiménez
Sent: Thursday, November 23, 2017 17:59
To: ***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>) <***@ietf.org><mailto:***@ietf.org>
Cc: ji-***@uni-due.de<mailto:ji-***@uni-due.de>
Subject: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Dear all,

The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.

Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.

Target to end the WGA is 14th of December.

Ciao,
- - Jaime Jiménez


________________________________
The information contained in this email may be confidential and/or legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this email is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original email.




_______________________________________________

core mailing list

***@ietf.org<mailto:***@ietf.org>

https://www.ietf.org/mailman/listinfo/core
--
Marco Tiloca, PhD

Research Institutes of Sweden

RISE ICT/SICS

Isafjordsgatan 22 / Kistagången 16

SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501

https://www.sics.se



The RISE institutes Innventia, SP and Swedish ICT

have merged in order to become a stronger research

and innovation partner for businesses and society.



SICS Swedish ICT AB, has now changed name to RISE SICS AB.
Göran Selander
2018-03-13 09:46:35 UTC
Permalink
Hi Esko,

Thanks for good comments!

Let’s recap the setting: The sender and recipient of a group OSCORE message needs to retrieve/derive the right security context for sending and receiving requests and responses, and the amount of data sent for this purpose should be as small as possible. This should apply to all phases of communication; first time, normal operation, after member has been excluded, etc.


The OSCORE message format includes the 'kid' and the 'kid context'. For the group setting:

* the kid contains the ID of the sending group member (Sender ID), unique in the group, assigned by the group manager (which could be just a short byte string).

* The kid context contains the group identifier, also assigned by the group manager and unique for this group manager. The kid context is a "context hint” helping the recipient endpoint find the security context. If endpoints are deployed with multiple uncoordinated group managers then they need to be able to handle coinciding group identifiers, e.g. by trying multiple security contexts to see if if any verifies. As long as the Master Secret is different for different groups (and different epochs of a group) and the Sender IDs within the group are unique, that is sufficient to make AEAD key and nonce different.


So there is no need for negligable probabilty of coinciding group identifiers as long as the recipient can find its way to the right security context. But in the case of an endpoint being in multiple groups managed by different group managers, it is of course favourable if the group identifiers are different. So we should rephrase this accordingly.


Further comments inline.

From: core <core-***@ietf.org<mailto:core-***@ietf.org>> on behalf of Esko Dijk <***@philips.com<mailto:***@philips.com>>
Date: Wednesday 7 March 2018 at 09:29
To: Marco Tiloca <***@ri.se<mailto:***@ri.se>>, Jaime Jiménez <***@ericsson.com<mailto:***@ericsson.com>>, "***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>)" <***@ietf.org<mailto:***@ietf.org>>
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Thanks Marco,

This update solves the issues I think and answers my questions, except for the randomness in the Gid: “A Gid MUST have a random component and be long enough, in order to achieve a negligible probability of collisions between Group Identifiers from different Group Managers”; and Appendix C.

The example Appendix C uses a single random byte. Most people would think the collision probability is quite high in this case; so how can this choice satisfy the requirement?

See above.

Maybe in this example the Group Managers pick a random value and then mutually verify that there are no collissions?


Yes, if there is coordination between group managers, but this is not necessary for the scheme to work as noted above.

The name “Group Epoch” could be slightly confusing here – Appendix C states the epoch applies to a single group. However the example there shows the epoch applies to all groups from the same Group Manager, or in other words the epoch *is* the group. (Because there is no thing like “Group ID” in the example, only GM random byte and Group Epoch bytes.) Was it intended to add a byte or so for “Group ID” ? So that each group can have its own epoch counter.


The intent was that the Group ID consists of a Group Prefix and a Group Epoch. The need for a group prefix is to allow a constant identifier of the group. The need for group epoch is to allow endpoints to find the right Master Keys used in the group at a certain time.

Group identifiers may be constructed in other ways that makes the recipient find the right security context.

Hope that helps.

Thanks,
Göran


Esko



From: Marco Tiloca <***@ri.se<mailto:***@ri.se>>
Sent: Monday, March 5, 2018 23:18
To: Esko Dijk <***@philips.com<mailto:***@philips.com>>; Jaime Jiménez <***@ericsson.com<mailto:***@ericsson.com>>; ***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>) <***@ietf.org<mailto:***@ietf.org>>
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap


Hello Esko,



Thanks for your support and comments, we have considered them when producing the latest version of the draft [1].



Please, find in line some answers to your comments.



Best,

/Marco



[1] https://tools.ietf.org/html/draft-ietf-core-oscore-groupcomm-01

On 2017-12-04 14:35, Esko Dijk wrote:
I also support the adoption of this draft as a work item for CoRE. Below are the results of a quick review, also.

Best regards
Esko Dijk


Overall comments – or work that the WG could take up next
· Detailed example with message sizes would be useful. Since it’s important for multicast over 6lowpan performance that the IPv6 packets stay small enough (one 802.15.4 frame). At this moment, I can’t judge that yet easily based on the draft.


[MT] We have now included detailed examples in Sections 3.1 (Request) and Section 3.2 (Response).


· Normally, for applications (e.g. Building automation and lighting) groups do need a stable and non-random group ID, that identifies the group over time even as changes occur, e.g. members added/removed. The “Gid” in the draft however changes. There could be some text added to explain how Gid is linked to a stable ID. E.g., this could be configured by the Group Manager. The stable group ID is then not used over-the-wire for multicast OSCORE.


[MT] It is true that the Gid in this draft changes over time, especially upon renewing the group keying material, and the Group Manager is the only responsible for managing its value update. However, this Gid has to be intended as the identifier of the OSCORE “security group”, including as members the endpoints that share the same Common Security Context.

[MT] As you say, applications do rely on a stable and non-random group ID, which is not used over-the-wire for group OSCORE, and instead identifies an “application group” having as members the endpoints that participate in a same group application. There is no relation between this application-level group ID and the OSCORE Gid defined in this draft. However, one may possibly map multiple “application groups” to the same “security group”.

[MT] In order to clarify this point, we included also a definition of “Group” and “Group ID” in Section 1.1.


· There is normative text in the Appendices; it could be clarified what the status of this is. E.g. only normative if one chooses to implement the optional element described in the Appendix?I have a preference for avoiding normative text in the Appendices, but I’m curious to hear what others think.

[MT] We relaxed the text in Appendices to avoid normative references, with the exception of a “NOT RECOMMENDED” in current Appendix F “No Verification of Signatures”.


· The text sometimes suggests that a secure group context is linked to one and only one multicast IP address. In practice, there may be more variety – e.g. one multicast IP address plus one or more unicast IP addresses to which the group message is subsequently delivered. E.g. repeat of the group message to members which did not get it yet. The proposed solution could be reviewed with that view in mind, that there may be multiple (multicast/unicast) IP destination addresses to which a group message will be sent. I did not do that yet; can do so in a future in-depth review.


[MT] Thanks, that’s a very good comment. We’ll think more on the possible view you propose. It should be fine as long as a recipient is able to retrieve the right group Security Context, by using the Gid.



Section 2.1
Some things here are listed as out of scope, but they do come back later in the doc – such as forward security and backward security , which are addressed I think – certainly not out of scope.


[MT] Group OSCORE does not ensure forward security and backward security itself. Instead, they are entrusted to the specifying group rekeying protocol enforced by the Group Manager. The specific rekeying protocol if out of scope for Group OSCORE, which however recommends the use of one able to ensure backward and forward security in the group.



Section 3
" Gid MUST be random " -> seems to contradict Appendix B which uses an Epoch counter in the Gid. Should it say “MUST have a random component” ?


[MT] Right, now fixed (in current Appendix C).



Appendices

* Appendix B, a concrete example instance is missing. E.g. “w3fj90f0a_0042” or its bstr equivalent (just guessing here to the format)


[MT] We added an example, in current Appendix C.



*
* Appendix C, is this an example blueprint of how to do it – fully optional to follow or not follow this?


[MT] We relaxed the text in current Appendix D, as for the time being it is intended to be a guideline example.



*

Minor

* ligthing -> lighting
* enpoint -> endpoint
* Pg 25 , [I-D.ietf-ace-dtls-authorize] reference breaks across line and as such becomes non-searchable in the browser. And I like these refs to be searchable 😉





From: core [mailto:core-***@ietf.org] On Behalf Of Jaime Jiménez
Sent: Thursday, November 23, 2017 17:59
To: ***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>) <***@ietf.org><mailto:***@ietf.org>
Cc: ji-***@uni-due.de<mailto:ji-***@uni-due.de>
Subject: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Dear all,

The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.

Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.

Target to end the WGA is 14th of December.

Ciao,
- - Jaime Jiménez


________________________________
The information contained in this email may be confidential and/or legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this email is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original email.




_______________________________________________

core mailing list

***@ietf.org<mailto:***@ietf.org>

https://www.ietf.org/mailman/listinfo/core
--
Marco Tiloca, PhD

Research Institutes of Sweden

RISE ICT/SICS

Isafjordsgatan 22 / Kistagången 16

SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501

https://www.sics.se



The RISE institutes Innventia, SP and Swedish ICT

have merged in order to become a stronger research

and innovation partner for businesses and society.



SICS Swedish ICT AB, has now changed name to RISE SICS AB.
Esko Dijk
2018-03-19 10:45:13 UTC
Permalink
Thanks, that is clear now. So rephrasing the term “negligible probability” in Section 2 and Appendix C could help in this respect. How small this probability should be is up to the system designer in this case.

Esko

From: Göran Selander <***@ericsson.com>
Sent: Tuesday, March 13, 2018 10:47
To: Esko Dijk <***@philips.com>; ***@ietf.org WG (***@ietf.org) <***@ietf.org>
Cc: Marco Tiloca <***@ri.se>
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Hi Esko,

Thanks for good comments!

Let’s recap the setting: The sender and recipient of a group OSCORE message needs to retrieve/derive the right security context for sending and receiving requests and responses, and the amount of data sent for this purpose should be as small as possible. This should apply to all phases of communication; first time, normal operation, after member has been excluded, etc.



The OSCORE message format includes the 'kid' and the 'kid context'. For the group setting:

* the kid contains the ID of the sending group member (Sender ID), unique in the group, assigned by the group manager (which could be just a short byte string).

* The kid context contains the group identifier, also assigned by the group manager and unique for this group manager. The kid context is a "context hint” helping the recipient endpoint find the security context. If endpoints are deployed with multiple uncoordinated group managers then they need to be able to handle coinciding group identifiers, e.g. by trying multiple security contexts to see if if any verifies. As long as the Master Secret is different for different groups (and different epochs of a group) and the Sender IDs within the group are unique, that is sufficient to make AEAD key and nonce different.



So there is no need for negligable probabilty of coinciding group identifiers as long as the recipient can find its way to the right security context. But in the case of an endpoint being in multiple groups managed by different group managers, it is of course favourable if the group identifiers are different. So we should rephrase this accordingly.



Further comments inline.

From: core <core-***@ietf.org<mailto:core-***@ietf.org>> on behalf of Esko Dijk <***@philips.com<mailto:***@philips.com>>
Date: Wednesday 7 March 2018 at 09:29
To: Marco Tiloca <***@ri.se<mailto:***@ri.se>>, Jaime Jiménez <***@ericsson.com<mailto:***@ericsson.com>>, "***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>)" <***@ietf.org<mailto:***@ietf.org>>
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Thanks Marco,

This update solves the issues I think and answers my questions, except for the randomness in the Gid: “A Gid MUST have a random component and be long enough, in order to achieve a negligible probability of collisions between Group Identifiers from different Group Managers”; and Appendix C.

The example Appendix C uses a single random byte. Most people would think the collision probability is quite high in this case; so how can this choice satisfy the requirement?

See above.

Maybe in this example the Group Managers pick a random value and then mutually verify that there are no collissions?


Yes, if there is coordination between group managers, but this is not necessary for the scheme to work as noted above.

The name “Group Epoch” could be slightly confusing here – Appendix C states the epoch applies to a single group. However the example there shows the epoch applies to all groups from the same Group Manager, or in other words the epoch *is* the group. (Because there is no thing like “Group ID” in the example, only GM random byte and Group Epoch bytes.) Was it intended to add a byte or so for “Group ID” ? So that each group can have its own epoch counter.


The intent was that the Group ID consists of a Group Prefix and a Group Epoch. The need for a group prefix is to allow a constant identifier of the group. The need for group epoch is to allow endpoints to find the right Master Keys used in the group at a certain time.

Group identifiers may be constructed in other ways that makes the recipient find the right security context.

Hope that helps.

Thanks,
Göran


Esko



From: Marco Tiloca <***@ri.se<mailto:***@ri.se>>
Sent: Monday, March 5, 2018 23:18
To: Esko Dijk <***@philips.com<mailto:***@philips.com>>; Jaime Jiménez <***@ericsson.com<mailto:***@ericsson.com>>; ***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>) <***@ietf.org<mailto:***@ietf.org>>
Subject: Re: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap


Hello Esko,



Thanks for your support and comments, we have considered them when producing the latest version of the draft [1].



Please, find in line some answers to your comments.



Best,

/Marco



[1] https://tools.ietf.org/html/draft-ietf-core-oscore-groupcomm-01

On 2017-12-04 14:35, Esko Dijk wrote:
I also support the adoption of this draft as a work item for CoRE. Below are the results of a quick review, also.

Best regards
Esko Dijk


Overall comments – or work that the WG could take up next
· Detailed example with message sizes would be useful. Since it’s important for multicast over 6lowpan performance that the IPv6 packets stay small enough (one 802.15.4 frame). At this moment, I can’t judge that yet easily based on the draft.


[MT] We have now included detailed examples in Sections 3.1 (Request) and Section 3.2 (Response).



· Normally, for applications (e.g. Building automation and lighting) groups do need a stable and non-random group ID, that identifies the group over time even as changes occur, e.g. members added/removed. The “Gid” in the draft however changes. There could be some text added to explain how Gid is linked to a stable ID. E.g., this could be configured by the Group Manager. The stable group ID is then not used over-the-wire for multicast OSCORE.


[MT] It is true that the Gid in this draft changes over time, especially upon renewing the group keying material, and the Group Manager is the only responsible for managing its value update. However, this Gid has to be intended as the identifier of the OSCORE “security group”, including as members the endpoints that share the same Common Security Context.

[MT] As you say, applications do rely on a stable and non-random group ID, which is not used over-the-wire for group OSCORE, and instead identifies an “application group” having as members the endpoints that participate in a same group application. There is no relation between this application-level group ID and the OSCORE Gid defined in this draft. However, one may possibly map multiple “application groups” to the same “security group”.

[MT] In order to clarify this point, we included also a definition of “Group” and “Group ID” in Section 1.1.


· There is normative text in the Appendices; it could be clarified what the status of this is. E.g. only normative if one chooses to implement the optional element described in the Appendix?I have a preference for avoiding normative text in the Appendices, but I’m curious to hear what others think.

[MT] We relaxed the text in Appendices to avoid normative references, with the exception of a “NOT RECOMMENDED” in current Appendix F “No Verification of Signatures”.



· The text sometimes suggests that a secure group context is linked to one and only one multicast IP address. In practice, there may be more variety – e.g. one multicast IP address plus one or more unicast IP addresses to which the group message is subsequently delivered. E.g. repeat of the group message to members which did not get it yet. The proposed solution could be reviewed with that view in mind, that there may be multiple (multicast/unicast) IP destination addresses to which a group message will be sent. I did not do that yet; can do so in a future in-depth review.


[MT] Thanks, that’s a very good comment. We’ll think more on the possible view you propose. It should be fine as long as a recipient is able to retrieve the right group Security Context, by using the Gid.




Section 2.1
Some things here are listed as out of scope, but they do come back later in the doc – such as forward security and backward security , which are addressed I think – certainly not out of scope.


[MT] Group OSCORE does not ensure forward security and backward security itself. Instead, they are entrusted to the specifying group rekeying protocol enforced by the Group Manager. The specific rekeying protocol if out of scope for Group OSCORE, which however recommends the use of one able to ensure backward and forward security in the group.




Section 3
" Gid MUST be random " -> seems to contradict Appendix B which uses an Epoch counter in the Gid. Should it say “MUST have a random component” ?


[MT] Right, now fixed (in current Appendix C).




Appendices

* Appendix B, a concrete example instance is missing. E.g. “w3fj90f0a_0042” or its bstr equivalent (just guessing here to the format)


[MT] We added an example, in current Appendix C.




*
* Appendix C, is this an example blueprint of how to do it – fully optional to follow or not follow this?


[MT] We relaxed the text in current Appendix D, as for the time being it is intended to be a guideline example.




*

Minor

* ligthing -> lighting
* enpoint -> endpoint
* Pg 25 , [I-D.ietf-ace-dtls-authorize] reference breaks across line and as such becomes non-searchable in the browser. And I like these refs to be searchable 😉





From: core [mailto:core-***@ietf.org] On Behalf Of Jaime Jiménez
Sent: Thursday, November 23, 2017 17:59
To: ***@ietf.org<mailto:***@ietf.org> WG (***@ietf.org<mailto:***@ietf.org>) <***@ietf.org><mailto:***@ietf.org>
Cc: ji-***@uni-due.de<mailto:ji-***@uni-due.de>
Subject: [core] 🔔 WG Call for Adoption on draft-tiloca-core-multicast-oscoap

Dear all,

The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap<https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.

Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.

Target to end the WGA is 14th of December.

Ciao,
- - Jaime Jiménez


________________________________
The information contained in this email may be confidential and/or legally protected under applicable law. The message is intended solely for the addressee(s). If you are not the intended recipient, you are hereby notified that any use, forwarding, dissemination, or reproduction of this email is strictly prohibited and may be unlawful. If you are not the intended recipient, please contact the sender by return e-mail and destroy all copies of the original email.





_______________________________________________

core mailing list

***@ietf.org<mailto:***@ietf.org>

https://www.ietf.org/mailman/listinfo/core
--
Marco Tiloca, PhD

Research Institutes of Sweden

RISE ICT/SICS

Isafjordsgatan 22 / Kistagången 16

SE-164 40 Kista (Sweden)

Phone: +46 (0)70 60 46 501

https://www.sics.se



The RISE institutes Innventia, SP and Swedish ICT

have merged in order to become a stronger research

and innovation partner for businesses and society.



SICS Swedish ICT AB, has now changed name to RISE SICS AB.
Michael Koster
2017-12-04 13:50:37 UTC
Permalink
+1

I support adoption of draft-tiloca-core-multicast-oscoap <https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> by the CoRE Working Group.

Michael Koster
Post by Jaime Jiménez
Dear all,
The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap <https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.
Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.
Target to end the WGA is 14th of December.
Ciao,
- - Jaime Jiménez
_______________________________________________
core mailing list
https://www.ietf.org/mailman/listinfo/core
Jaime Jiménez
2018-02-06 17:33:19 UTC
Permalink
Dear CoRE-WG,

From both the email discussions and the in room consensus at last IETF, it seems that this draft is ready for adoption.

As with the other documents, this draft is not being tracked at the moment on https://github.com/core-wg/ <https://github.com/core-wg/> but if the authors consider it appropriate they can add it there.

Thanks,
- - Jaime Jiménez
Post by Jaime Jiménez
Dear all,
The draft on "Secure group communication for CoAP" ( draft-tiloca-core-multicast-oscoap <https://tools.ietf.org/html/draft-tiloca-core-multicast-oscoap/> ) had in room consensus for adoption during IETF99 already, now we are clear to confirm it on the mailing list.
Please reply to the list with your comments, including although not limited to whether or not you support adoption. Non-authors are especially encouraged to comment.
Target to end the WGA is 14th of December.
Ciao,
- - Jaime Jiménez
_______________________________________________
core mailing list
https://www.ietf.org/mailman/listinfo/core
Loading...