Key Management for OSCORE Groups in ACE
draft-ietf-ace-key-groupcomm-oscore-08

Document Type Active Internet-Draft (ace WG)
Last updated 2020-07-13
Replaces draft-tiloca-ace-oscoap-joining
Stream IETF
Intended RFC status (None)
Formats plain text pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state I-D Exists
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)
ACE Working Group                                              M. Tiloca
Internet-Draft                                                   RISE AB
Intended status: Standards Track                                 J. Park
Expires: January 14, 2021                    Universitaet Duisburg-Essen
                                                            F. Palombini
                                                             Ericsson AB
                                                           July 13, 2020

                Key Management for OSCORE Groups in ACE
                draft-ietf-ace-key-groupcomm-oscore-08

Abstract

   This specification defines an application profile of the ACE
   framework for Authentication and Authorization, to request and
   provision keying material in group communication scenarios that are
   based on CoAP and secured with Group Object Security for Constrained
   RESTful Environments (OSCORE).  This application profile delegates
   the authentication and authorization of Clients that join an OSCORE
   group through a Resource Server acting as Group Manager for that
   group.  This application profile leverages protocol-specific
   transport profiles of ACE to achieve communication security, server
   authentication and proof-of-possession for a key owned by the Client
   and bound to an OAuth 2.0 access token.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 14, 2021.

Copyright Notice

   Copyright (c) 2020 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Tiloca, et al.          Expires January 14, 2021                [Page 1]
Internet-Draft   Key Management for OSCORE Groups in ACE       July 2020

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
     1.1.  Terminology . . . . . . . . . . . . . . . . . . . . . . .   4
   2.  Protocol Overview . . . . . . . . . . . . . . . . . . . . . .   5
     2.1.  Overview of the Joining Process . . . . . . . . . . . . .   6
     2.2.  Overview of the Group Rekeying Process  . . . . . . . . .   6
   3.  Format of Scope . . . . . . . . . . . . . . . . . . . . . . .   7
   4.  Joining Node to Authorization Server  . . . . . . . . . . . .   8
     4.1.  Authorization Request . . . . . . . . . . . . . . . . . .   9
     4.2.  Authorization Response  . . . . . . . . . . . . . . . . .   9
   5.  Interface at the Group Manager  . . . . . . . . . . . . . . .   9
     5.1.  GET Handler . . . . . . . . . . . . . . . . . . . . . . .   9
   6.  Token POST and Group Joining  . . . . . . . . . . . . . . . .  10
     6.1.  Token Post  . . . . . . . . . . . . . . . . . . . . . . .  10
     6.2.  Sending the Joining Request . . . . . . . . . . . . . . .  12
       6.2.1.  Value of the N_S Challenge  . . . . . . . . . . . . .  13
     6.3.  Processing the Joining Request  . . . . . . . . . . . . .  13
     6.4.  Joining Response  . . . . . . . . . . . . . . . . . . . .  15
     6.5.  ACE Groupcomm Policy for Group OSCORE Pairwise Mode
           Support . . . . . . . . . . . . . . . . . . . . . . . . .  18
   7.  Public Keys of Joining Nodes  . . . . . . . . . . . . . . . .  18
   8.  Retrieval of Updated Keying Material  . . . . . . . . . . . .  20
     8.1.  Retrieval of Group Keying Material  . . . . . . . . . . .  20
     8.2.  Retrieval of Group Keying Material and Sender ID  . . . .  21
   9.  Retrieval of New Keying Material  . . . . . . . . . . . . . .  21
   10. Retrieval of Public Keys of Group Members . . . . . . . . . .  22
   11. Update of Public Key  . . . . . . . . . . . . . . . . . . . .  23
   12. Retrieval of Group Policies . . . . . . . . . . . . . . . . .  23
   13. Retrieval of Keying Material Version  . . . . . . . . . . . .  24
   14. Retrieval of Group Status . . . . . . . . . . . . . . . . . .  24
Show full document text