Hi Marco,

I created potential resolutions for the remaining open points in this draft in 
a series of short PRs in the current repository. Could you take a look at these 
and see if these resolve your comments?

@chairs: Could you create a repository for “est-oscore” under github.com/ace-wg 
<http://github.com/ace-wg> so that I could transition the sources? Thanks!

Mališa

> On May 11, 2023, at 18:06, Marco Tiloca <marco.til...@ri.se> wrote:
> 
> Hi Mališa,
> 
> Thanks!
> 
> The PR looks good to me, and the comments on the resolution of the open 
> points match with my recollection from the discussion at the latest ACE 
> interim meeting.
> 
> Just one side comment: since this is a WG document, I think it's better if 
> its sources and issues are moved to a new Github repo under the IETF ACE WG 
> Github organization [1].
> 
> Best,
> /Marco
> 
> [1] https://github.com/ace-wg
> 
> On 2023-05-11 16:20, Mališa Vučinić wrote:
>> Hi Marco,
>> 
>> Thanks a million for this review. In response, we have created a Pull 
>> Request at [1] which integrates the changes to non-controversial points. I 
>> respond inline for each point, whether it has been addressed or the planned 
>> action to take. My comments are encapsulated within [MV] … [/MV] tags. 
>> 
>> Mališa
>> 
>> [1] https://github.com/EricssonResearch/EST-OSCORE/pull/8 
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=REZA%2FXKbyI3%2B1XXkDJ%2Fgwf94A%2BuyW2skVUoIoF4yv%2BQ%3D&reserved=0>
>> 
>>> On Apr 29, 2023, at 12:04, Marco Tiloca 
>>> <marco.tiloca=40ri...@dmarc.ietf.org> 
>>> <mailto:marco.tiloca=40ri...@dmarc.ietf.org> wrote:
>>> 
>>> Hello ACE,
>>> 
>>> Please see below some comments on this document.
>>> 
>>> Best,
>>> /Marco
>>> 
>>> 
>>> [General]
>>> 
>>> * Replace RFC 7049 with RFC 8949
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/1947e005ca371cae08e80cf565ee18fba6809e4f
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F1947e005ca371cae08e80cf565ee18fba6809e4f&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=BScvV%2FqWNvxiP%2FfyxXTHgYJQdKaDJmZ0jNw%2Fu9TpCE8%3D&reserved=0>
>>  [/MV]
>> 
>>> * Replace RFC 8152 with RFC 9052 and RFC 9053
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/519217505b23a6732ec33e85a9c789274fbcb006
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F519217505b23a6732ec33e85a9c789274fbcb006&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tNThWvEi9qgC%2F5emAPefk0DhBQJVstHTxzsG5CvUX%2BI%3D&reserved=0>
>>  [/MV]
>> 
>>> * When mentioning DTLS and referring to RFC 6347, refer also to RFC 9147
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/7789963a069e2be7311274e71f6653123ff87102
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F7789963a069e2be7311274e71f6653123ff87102&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=IVDppZkFFqvtJN930L1rDfLToF9K%2BNBzNt%2FMfUO0bG8%3D&reserved=0>
>>  [/MV]
>>> 
>>> * As expected, the draft focuses on the EDHOC forward message flow, as it 
>>> better maps against the EST expected workflow and ensures to protect the 
>>> identity of the EST client. That said, can the use of the EDHOC reverse 
>>> message flow be explicitly ruled out altogether?
>> 
>> [MV] As discussed in the meeting, the proposed action here is to add an 
>> explicit statement in Section 3 (Authentication) that the EST client MUST 
>> play the role of the EDHOC initiator. [/MV]
>> 
>> 
>>> [Section 1]
>>> 
>>> * s/secured HTTP/HTTP [RFC9110][RFC9112] and TLS [RFC8446]
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/a753faf2c9d44e8289cb186c68cc1a5879db3806
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fa753faf2c9d44e8289cb186c68cc1a5879db3806&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=MnKzbjOMgFjGkn2XgQMPwRsvktUJPaDYJWDCj8oTpEQ%3D&reserved=0>
>>  [/MV]
>> 
>>> * s/which protects the application layer message/which protects messages at 
>>> the application layer
>>> 
>>> * s/multicast CoAP messages/CoAP group messages
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/5e021fd279c408a15f528de1244b084ff0506efe
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F5e021fd279c408a15f528de1244b084ff0506efe&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Y3jwXJOc4Z7s8sccUCGLSFOJq9J1fe4kUECCxW3I%2Bdg%3D&reserved=0>
>>  [/MV]
>>> 
>>> 
>>> [Section 1.1]
>>> 
>>> * "The concept "Registrar" and its required trust relation with EST server 
>>> as described in Section 5 of [RFC9148] is therefore redundant."
>>> 
>>>    Do you really mean "redundant"? Isn't it actually "inapplicable"?
>> 
>> 
>> [MV] Replaced “redundant” with “not applicable” in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/844d764ad07f1610fdd1b3b3518185e442be0c96
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F844d764ad07f1610fdd1b3b3518185e442be0c96&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=cMvbk3Sz%2FRKmdcf2ST%2BMuASrQLUCt8dnLzdk8RCfsFs%3D&reserved=0>
>>  [/MV]
>> 
>> 
>>>    In the presence of end-to-end security through OSCORE between the EST 
>>> client and server, an hypothetical Registrar cannot perform its task as it 
>>> does instead in RFC 9148. In this case instead, an intermediary would be 
>>> simply limited to be a (cross-)proxy, on which indeed less trust needs to 
>>> be put.
>> 
>> [MV] 
>> 
>> Agreed: I believe that your statement is covered by the precedeing sentence 
>> in the section on “Operational Differences with EST-coaps”, which states:
>> 
>> "The EST payloads protected by OSCORE can be proxied between constrained 
>> networks supporting CoAP/CoAPs and non-constrained networks supporting 
>> HTTP/HTTPs with a CoAP-HTTP proxy protection without any security processing 
>> in the proxy (see {{proxying}}). "
>> 
>> [/MV] 
>> 
>>> [Section 3.0]
>>> 
>>> * "This specification replaces the DTLS handshake in EST-coaps with the 
>>> lightweight authenticated key exchange protocol EDHOC 
>>> [I-D.ietf-lake-edhoc]."
>>> 
>>>    However, Section 1 talks about possible co-existence of OSCORE and DTLS, 
>>> rather than of replacement. I think you mean "replaces or complements", 
>>> like said in the previous sections.
>>> 
>>> * "... and establish the OSCORE security context with which the EST 
>>> payloads are protected."
>>> 
>>>    This should be "... Security Context used to protect the messages 
>>> conveying the EST payloads."
>>> 
>>> * I suggest to split the second paragraph into two parts.
>>> 
>>>   The first part ends with the current "The server MUST authenticate the 
>>> client". The text can highlight that all those requirements are fulfilled 
>>> when specifically using EDHOC.
>>> 
>>>   The second part would say "The server MUST also provide relevant 
>>> information to the CA for decision about issuing a certificate".
>> 
>> 
>> [MV] The comments above are addressed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/49551af2d3142b5fb139852760548e8a4eb96d77
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F49551af2d3142b5fb139852760548e8a4eb96d77&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=C5FtQu%2Fl%2F1VfvwfpHtwAztPqOEshWrHp5%2FaABymZV80%3D&reserved=0>
>>  [/MV]
>> 
>>> [Section 3.1]
>>> 
>>> * "or a pointer such as a URI to the credential (e.g., x5t, see 
>>> [I-D.ietf-cose-x509])"
>>> 
>>>    This is mixing a type of credential reference with the abbreviated name 
>>> of a different reference type. Either say a hash and then the parameter 
>>> x5t, or a URI and then the parameter x5u.
>> 
>> [MV] We fixed this by replacing the example notion of x5t with x5u in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e4033cc7d644f38ced164bf4b58a08a1e7a6dc8e
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe4033cc7d644f38ced164bf4b58a08a1e7a6dc8e&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=g3qtWxUbKBY6SVSlLJs0U%2F96SK9Nny%2BxcXLlv%2Fb3jks%3D&reserved=0>
>>  [/MV]
>> 
>> 
>>> [Section 3.3]
>>> 
>>> * Section 1 says: "pre-shared OSCORE keying material would also be an 
>>> option."
>>> 
>>>    In such a case, is channel binding simply not achievable?
>>> 
>>>    Or is it somehow possible as long as the OSCORE keying material was 
>>> established through some sort of interactive protocol (e.g., like the 
>>> OSCORE profile of ACE, see RFC 9203)?
>> 
>> 
>> [MV] As discussed in the meeting, the proposed action here is to explicitly 
>> specify that EDHOC-Exporter-based channel binding is applicable only to 
>> cases where EDHOC is executed prior to enrollment and to state that the 
>> channel binding is not supported when pre-shared OSCORE context is used. 
>> [/MV]
>> 
>>> 
>>> * "length equals the desired length of the edhoc-unique byte string"
>>> 
>>>    I think it's better to specify a length of the byte string to use, 
>>> unless otherwise indicated/advertised (e.g., in a used EDHOC application 
>>> profile). RFC 9148 considers 32 bytes (see its Section 3).
>> 
>> [MV] Yes, agreed. Similar to RFC 9148, we now specify the length of 32 bytes 
>> for edhoc-unique value. This is committed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/4fe0527f0ace8c3bd491fbac895164e225ee72a3
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F4fe0527f0ace8c3bd491fbac895164e225ee72a3&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=OLKIyx1%2ByWUJpxlBtEUhd9F%2B7Zd4qDtxI2E%2B6aveYfA%3D&reserved=0>
>> [/MV]
>> 
>> 
>>> [Section 3.4]
>>> 
>>> * In scenarios using message_4, wouldn't it make sense to have the PKCS#10 
>>> request and response transported in an EAD_3 and EAD_4 item, respectively?
>> 
>> [MV] As discussed in the meeting, the reason for not transporting PKCS 
>> objects within EAD fields of EDHOC is that we also consider re-enrollment 
>> where EDHOC is not necessarily executed. Therefore, proposed action is to 
>> informatively mention that not using EAD is intentional. [/MV]
>> 
>> 
>>> * s/The certificate MAY be referenced/The client certificate MAY be 
>>> referenced
>>> 
>>> * s/response to the PKCS#10 request MAY be/response to the PKCS#10 request 
>>> MAY specify
>>> 
>>> 
>>> [Section 4.0]
>>> 
>>> * "OSCORE [RFC8613] is used to protect the EST payloads."
>>> 
>>>    This should be "OSCORE [RFC8613] is used to protect the messages 
>>> conveying the EST payloads."
>>> 
>>> * s/DTLS handshake is replaced with EDHOC/The DTLS handshake is 
>>> complemented by or replaced with EDHOC
>>> 
>>>    Then the following sentence can clarify that the architecture shown in 
>>> Figure 6 does not consider the additional use of DTLS.
>> 
>> 
>> [MV] The comments above were addressed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/69aadd5515277f82256e6ee1059018fb2c1ecc65
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F69aadd5515277f82256e6ee1059018fb2c1ecc65&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2FRfmkq1ALOShvOtBbr0%2BgTZxqIlQ%2FgcU28QVC4rYrjM%3D&reserved=0>
>>  [/MV]
>> 
>>> [Section 4.1]
>>> 
>>> * In the shown example, the resource type should be rt="ace.est.sen" also 
>>> in the link specified in the response.
>> 
>> [MV] This is fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e03c708c36e92a70ecd322b3fe5b04d8e4014096
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe03c708c36e92a70ecd322b3fe5b04d8e4014096&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=6ghbrJr1dZf21DupGGACe9g%2FhfQNicxr03pg3HuBtvQ%3D&reserved=0>
>>  [/MV]
>> 
>> 
>>> * Per Section 9 of RFC 8613, the "osc" attribute is optionally included in 
>>> a link to specify that a resource has to be accessed with OSCORE. Should it 
>>> remain optional here too?
>>> 
>>>    Consider a setup where OSCORE and DTLS are combined. Especially when 
>>> discovering EST resources on a non-default port number, the links to those 
>>> resources would have URI scheme "coaps". Then, the absence of the "osc" 
>>> attribute might wrongly suggest that the EST server is actually using 
>>> EST-coaps.
>>> 
>>>    Therefore, it might be worth mandating the use of the attribute "osc" in 
>>> links to EST resources accessed as in this specification.
>>> 
>>>    An alternative would be defining a new set of EST-OSCORE-related 
>>> Resource Type values, such as "ace.est.osc.*".
>> 
>> [MV] As discussed in the meeting, the proposed action here is to mandate the 
>> use of the attribute “osc” in links to EST resources. [/MV]
>> 
>>> [Section 4.2]
>>> 
>>> * Regarding the response from /skc, is it possible to deviate from what is 
>>> defined in RFC 9148 and *not* encrypt the private key? After all, 
>>> end-to-end encryption of the whole EST payload is ensured by OSCORE.
>>> 
>>>    If yes, that might open for a new Content-Format pair (284, 287), i.e., 
>>> an unencrypted PKCS #8 private key together with a single certificate (not 
>>> a PKCS #7 container).
>> 
>> [MV] As agreed in the meeting, we will specify that the response /skc can be 
>> PKCS #8 private key because OSCORE is used, and also specify the new 
>> Context-Format pair. [/MV]
>> 
>>> [Section 4.3]
>>> 
>>> * "EST-oscore uses the same CoAP Content-Format Options to transport EST 
>>> requests and responses"
>>> 
>>>    I think you mean: "EST-oscore uses the same CoAP Content-Format 
>>> identifiers when transferring EST requests and responses".
>>> 
>>> * The caption of Table 2 should be: "EST functions and the associated CoAP 
>>> Content-Format identifiers"
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/78f07ac2885e2b865647377924cd3566a789181c
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F78f07ac2885e2b865647377924cd3566a789181c&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611478692%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=01C5V5%2FedOK2QxlZ%2BOMD%2BY6iE5nuU6fRj4%2B4EO9n40U%3D&reserved=0>
>>  [/MV]
>> 
>>> 
>>> * I suppose your intention is for the EST client and server to support 
>>> Content-Formats just like in RFC 9148, i.e.:
>>> 
>>>    "Content-Format 281 MUST be supported by EST-coaps servers. Servers MAY 
>>> also support Content-Format 287. It is up to the client to support only 
>>> Content-Format 281, 287 or both."
>>> 
>>>    I think it is good to have an explicit statement here too.
>>> 
>>> * Like RFC 9148 does in its Table 3, it is good to also recap the 
>>> Content-Format identifiers used for the different parts of the responses 
>>> from /skg and /skc.
>> 
>> [MV] As agreed in the meeting, we will specify explicitly Content-Format 
>> support and add a Table similar to RFC 9148 Table 3. [/MV]
>> 
>> 
>>> [Section 4.4]
>>> 
>>> * The list of requirements is preceded by "It is RECOMMENDED that". 
>>> However, isn't it a MUST for (at least) the CoAP options OSCORE and 
>>> Uri-Path?
>> 
>> [MV] 
>> As discussed in the meeting, the action here is to avoid the use of 
>> normative keywords and rephrase to informatively discuss what is expected to 
>> be supported. This is now done in  
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/455ef9f7399619eaa9abfbb35f97864e69b88e72
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F455ef9f7399619eaa9abfbb35f97864e69b88e72&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=qj7xV3MFVBwELVwpXin2gONGh2aXIfY5TpKKxjoXqjc%3D&reserved=0>
>> 
>> [/MV]
>> 
>>> * "The EST URLs based on https:// are translated to coap://, but with 
>>> mandatory use of the CoAP OSCORE option."
>>> 
>>>    The scheme "coap" is the translation target only if DTLS is not 
>>> additionally used.
>> 
>> [MV] As agreed in the meeting, we will explicitly mention that if DTLS is 
>> used, scheme is “coaps”. [/MV]
>> 
>>> [Section 4.6]
>>> 
>>> * "such as CBOR-encoded payloads ([I-D.ietf-cose-cbor-encoded-cert])"
>>> 
>>>    Perhaps you meant to refer to RFC 8949?
>>> 
>>> * s/reconstitution/reassembly
>> 
>> [MV] Comments above fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e83c809ce105b50e6f7be1a1b13def7ceb9840e2
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe83c809ce105b50e6f7be1a1b13def7ceb9840e2&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=LH2QNk4oMj%2FEysLeL5kfsRJ0v3WwPYV31XJvH2x%2Fe8A%3D&reserved=0>
>>  [/MV]
>>> 
>>> * "this specification mandates the implementation of CoAP option Block1 and 
>>> Block2 fragmentation mechanism [RFC7959]"
>>> 
>>>    This is good, but it contradicts the text in Section 4.4 where the 
>>> support of the CoAP option Block1 and Block2 is only RECOMMENDED.
>> 
>> [MV] As discussed in the meeting, we will replace this text with 
>> requirements similar to Section 4.6 of RFC 9148 on Block1 and Block2. [/MV]
>> 
>>> [Section 4.8]
>>> 
>>> * "The EST client prepares the PKCS #10 object and signs it by following 
>>> the steps in Section 4 of [RFC6955]."
>>> 
>>>    Even though Section 4 of RFC 6955 does use the words "The value to be 
>>> signed", it is quite confusing to read "signs it" in this section, which 
>>> correctly starts with saying that a Diffie-Hellman key pair cannot be used 
>>> for signing operations.
>>> 
>>>    I think that here it is worth saying "and computing a MAC" instead of 
>>> "and signs it".
>> 
>> [MV] Fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/e83c809ce105b50e6f7be1a1b13def7ceb9840e2
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2Fe83c809ce105b50e6f7be1a1b13def7ceb9840e2&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=LH2QNk4oMj%2FEysLeL5kfsRJ0v3WwPYV31XJvH2x%2Fe8A%3D&reserved=0>
>>  [/MV]
>> 
>>> 
>>> 
>>> [Section 5]
>>> 
>>> * "the EST payloads can be protected end-to-end"
>>> 
>>>    This should be "the messages conveying the EST payloads can be protected 
>>> end-to-end"
>>> 
>>> * "Therefore the concept "Registrar" and its required trust relation with 
>>> EST server as described in Section 5 of [RFC9148] is redundant."
>>> 
>>>    See a previous comment about Section 1.1, on the word "redundant".
>>> 
>>> * "The use of TLS and DTLS is optional."
>>> 
>>>    Proposed rephrasing: "The additional use of TLS or DTLS is optional."
>> 
>> [MV] Comments above are fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/63d491225c85f5582e31d3de3df0ba4b865eb724
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F63d491225c85f5582e31d3de3df0ba4b865eb724&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Ks66zzVgjskpREBJ6KvAEFgGt5zpSfqDf85qXwczADY%3D&reserved=0>
>>  [/MV]
>>> 
>>> * If a secure association is needed between the EST Client and the 
>>> CoAP-to-HTTP Proxy, this may alternatively and more conveniently rely on 
>>> OSCORE as well, see 
>>> https://datatracker.ietf.org/doc/draft-tiloca-core-oscore-capable-proxies/ 
>>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-tiloca-core-oscore-capable-proxies%2F&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=0OmkiEnpJeDypzolYm%2FNShx51fDtQGUT7WgiA8PPTdA%3D&reserved=0>
>> 
>> [MV] As discussed in the meeting, the proposed action here is to 
>> informatively reference draft-tiloca-core-oscore-capable-proxies as a way to 
>> establish a secure association between the EST client and CoAP-to-HTTP 
>> proxy. [/MV]
>> 
>>> 
>>> [Nits]
>>> 
>>> * Section 1
>>> --- s/of underlying transport/of the underlying transport
>>> --- s/needs to be kept/need to be kept
>>> --- s/between EST-oscore client/between the EST-oscore client
>>> 
>>> * Section 1.1
>>> --- s/replaced, or complemented, with OSCORE/replaced by, or complemented 
>>> with, OSCORE
>>> --- s/replaced, or complemented, with the lightweight/replaced by, or 
>>> complemented with, the lightweight
>>> --- s/relation with EST/relation with the EST
>>> 
>>> * Section 3
>>> --- s/initial enrollment the EST-oscore/initial enrollment, the EST-oscore
>>> --- s/EST-oscore clients and/The EST-oscore clients and
>>> 
>>> * Section 3.2
>>> --- s/between EST client and/between the EST client and
>>> 
>>> * Section 3.4
>>> --- s/e.g. using/e.g., using
>>> 
>>> * Section 4
>>> --- s/Instead of DTLS record/Instead of the DTLS record
>>> 
>>> * Section 4.2.1
>>> --- s/e.g. using/e.g., using
>>> 
>>> * Section 4.6
>>> --- s/depending on application/depending on the application
>>> --- s/than available frame size resulting/than the available frame size 
>>> thus resulting
>>> --- s/implementation of CoAP option/implementation of the CoAP option
>>> --- s/fragmentation mechanism/to enforce the fragmentation mechanism 
>>> defined in
>>> 
>>> * Section 5
>>> --- s/between EST client and EST server independent/between the EST client 
>>> and EST server, irrespective
>> 
>> [MV] Nits above were fixed in 
>> https://github.com/EricssonResearch/EST-OSCORE/pull/8/commits/8337d01576f42e8ac17f267283690e550a347aeb
>>  
>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FEricssonResearch%2FEST-OSCORE%2Fpull%2F8%2Fcommits%2F8337d01576f42e8ac17f267283690e550a347aeb&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=o8YwblZZFeYjbprKvVQzmbLJN8MSK%2F3TGzLOmwqS5yg%3D&reserved=0>
>>  [/MV]
>> 
>> 
>>> -- 
>>> Marco Tiloca
>>> Ph.D., Senior Researcher
>>> 
>>> Phone: +46 (0)70 60 46 501
>>> 
>>> RISE Research Institutes of Sweden AB
>>> Box 1263
>>> 164 29 Kista (Sweden)
>>> 
>>> Division: Digital Systems
>>> Department: Computer Science
>>> Unit: Cybersecurity
>>> 
>>> https://www.ri.se 
>>> <https://eur05.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ri.se%2F&data=05%7C01%7Cmarco.tiloca%40ri.se%7Cf3f50fc3a8cb48d195f108db522af089%7C5a9809cf0bcb413a838a09ecc40cc9e8%7C0%7C0%7C638194116611634926%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=yzgEUk8VdLXf95IMjtFfaFV1rRqZXnEDoo%2FaOIjIPww%3D&reserved=0><OpenPGP_0xEE2664B40E58DA43.asc>_______________________________________________
>>> Ace mailing list
>>> Ace@ietf.org <mailto:Ace@ietf.org>
>>> https://www.ietf.org/mailman/listinfo/ace
>> 
>> 
>> 
>> _______________________________________________
>> Ace mailing list
>> Ace@ietf.org <mailto:Ace@ietf.org>
>> https://www.ietf.org/mailman/listinfo/ace
> 
> -- 
> Marco Tiloca
> Ph.D., Senior Researcher
> 
> Phone: +46 (0)70 60 46 501
> 
> RISE Research Institutes of Sweden AB
> Box 1263
> 164 29 Kista (Sweden)
> 
> Division: Digital Systems
> Department: Computer Science
> Unit: Cybersecurity
> 
> https://www.ri.se <https://www.ri.se/><OpenPGP_0xEE2664B40E58DA43.asc>

_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to