Key Management for OSCORE Groups in ACE
draft-ietf-ace-key-groupcomm-oscore-10
ACE Working Group M. Tiloca
Internet-Draft RISE AB
Intended status: Standards Track J. Park
Expires: August 26, 2021 Universitaet Duisburg-Essen
F. Palombini
Ericsson AB
February 22, 2021
Key Management for OSCORE Groups in ACE
draft-ietf-ace-key-groupcomm-oscore-10
Abstract
This specification defines an application profile of the ACE
framework for Authentication and Authorization, to request and
provision keying material in group communication scenarios that are
based on CoAP and secured with Group Object Security for Constrained
RESTful Environments (OSCORE). This application profile delegates
the authentication and authorization of Clients that join an OSCORE
group through a Resource Server acting as Group Manager for that
group. This application profile leverages protocol-specific
transport profiles of ACE to achieve communication security, server
authentication and proof-of-possession for a key owned by the Client
and bound to an OAuth 2.0 Access Token.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 26, 2021.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
Tiloca, et al. Expires August 26, 2021 [Page 1]
Internet-Draft Key Management for OSCORE Groups in ACE February 2021
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 4
2. Protocol Overview . . . . . . . . . . . . . . . . . . . . . . 5
2.1. Overview of the Joining Process . . . . . . . . . . . . . 6
2.2. Overview of the Group Rekeying Process . . . . . . . . . 6
3. Format of Scope . . . . . . . . . . . . . . . . . . . . . . . 7
4. Joining Node to Authorization Server . . . . . . . . . . . . 8
4.1. Authorization Request . . . . . . . . . . . . . . . . . . 9
4.2. Authorization Response . . . . . . . . . . . . . . . . . 9
5. Interface at the Group Manager . . . . . . . . . . . . . . . 10
5.1. ace-group/GROUPNAME/active . . . . . . . . . . . . . . . 10
5.1.1. GET Handler . . . . . . . . . . . . . . . . . . . . . 10
5.2. Admitted Methods . . . . . . . . . . . . . . . . . . . . 11
6. Token POST and Group Joining . . . . . . . . . . . . . . . . 12
6.1. Token Post . . . . . . . . . . . . . . . . . . . . . . . 13
6.1.1. 'ecdh_info' Parameter . . . . . . . . . . . . . . . . 14
6.2. Sending the Joining Request . . . . . . . . . . . . . . . 16
6.2.1. Value of the N_S Challenge . . . . . . . . . . . . . 17
6.3. Processing the Joining Request . . . . . . . . . . . . . 18
6.4. Joining Response . . . . . . . . . . . . . . . . . . . . 20
7. Public Keys of Joining Nodes . . . . . . . . . . . . . . . . 24
8. Retrieval of Updated Keying Material . . . . . . . . . . . . 26
8.1. Retrieval of Group Keying Material . . . . . . . . . . . 26
8.2. Retrieval of Group Keying Material and Sender ID . . . . 27
9. Requesting a Change of Keying Material . . . . . . . . . . . 27
10. Retrieval of Public Keys and Roles for Group Members . . . . 29
11. Update of Public Key . . . . . . . . . . . . . . . . . . . . 29
12. Retrieval of Group Policies . . . . . . . . . . . . . . . . . 30
Show full document text