Use Cases for Authentication and Authorization in Constrained Environments
RFC 7744
Yes
(Barry Leiba)
(Kathleen Moriarty)
No Objection
(Alvaro Retana)
(Deborah Brungard)
(Joel Jaeggli)
(Martin Stiemerling)
(Terry Manderson)
Note: This ballot was opened for revision 09 and is now closed.
Barry Leiba Former IESG member
Yes
Yes
(for -09)
Unknown
Ben Campbell Former IESG member
Yes
Yes
(2015-10-21 for -09)
Unknown
While I'm not ordinarily a big fan of publishing use cases as RFCs, I think this one has value. Otherwise, I have only a few minor comments: -Please expand ACE in the title, abstract, and body. - 2.6.1: Is it reasonable to expect wearable devices to have what sound like multi-user-profile capabilities? - 2.7: An informational reference for stuxnet might be helpful.
Kathleen Moriarty Former IESG member
Yes
Yes
(for -09)
Unknown
Spencer Dawkins Former IESG member
Yes
Yes
(2015-10-21 for -09)
Unknown
This draft seems especially worth the effort of publishing a use case draft as an RFC. I learned a lot while reviewing it. The security considerations section seemed unusually valuable for a use case draft. Do the title and abstract call enough attention to that? The section title "2.1.1. Bananas for Munich" would also be a great name for a rock band ... :-)
Stephen Farrell Former IESG member
Yes
Yes
(2015-10-22 for -09)
Unknown
Excellent and well written document, thanks. I think there are five things you could usefully add, see below. That said, I agree that this cannot and should not try to be fully complete so I won't argue (much:-) if you prefer to omit these. We/you can figure out what if any text to add I'm sure, but I'm happy to chat about that. 1. Software update is really needed and often missing and usually hard. There's at least a need to authenticate and authorize new firmware, when there is any update. That may not be the same as authorizing a new config. 2. Alice buys a new device, and would like to know if it is calling home or what it is doing before she configures it, or perhaps before she accepts it in her network. Even if she accepts it, she may want to be able to monitor the data it is sending "home" e.g. to ensure her TV is not sending data when she inserts a USB stick, if that is undesired. 3. Device fingerprinting is a threat that ought be considered by solution developers, especially if there is no reliable software update. Probably the best to be done is to try to make it hard for unauthorized parties to fingerprint a device, but that's also hard. 4. Commercial Devices will be end-of-lifed by vendors, and yet Alice still needs to be able to use, and perhaos to update, the device. That calls for some kind of authorization handover which is not quite the same as a change of ownership. 5. Penetration testing will happen and devices should not barf even then. Maybe that's a security consideration worth a mention. See also the secdir review. [1] It'd be good to see a response to that. [1] https://www.ietf.org/mail-archive/web/secdir/current/msg06101.html
Alvaro Retana Former IESG member
No Objection
No Objection
(for -09)
Unknown
Benoît Claise Former IESG member
No Objection
No Objection
(2015-10-20 for -09)
Unknown
"ACE use cases." And ACE stands for :-)
Deborah Brungard Former IESG member
No Objection
No Objection
(for -09)
Unknown
Jari Arkko Former IESG member
No Objection
No Objection
(2015-10-22 for -09)
Unknown
The comment from Joel Halpern's Gen-ART review might be something to take into account in the final version of the RFC.
Joel Jaeggli Former IESG member
No Objection
No Objection
(for -09)
Unknown
Martin Stiemerling Former IESG member
No Objection
No Objection
(for -09)
Unknown
Terry Manderson Former IESG member
No Objection
No Objection
(for -09)
Unknown