Hello AIF experts and ACE group,

looking into AIF (in particular the REST-specific model) for use on
embedded (RIOT OS based) systems, there are properties I'd like to
express additional properties in a token, eg:

a. "When responses are sent to a client authorized with this token, the
   server may place non-confidential but possibly attack relevant data in
   problem-details."

   (Like, stack traces with program counters and/or line numbers, not the
   content of the stack).

b. "Under memory load, evict state from this token last."

   (In particular, a server may have an LRU cache of OSCORE/EDHOC
   contexts, but this context will only be evicted from there by another
   context established from a token with the same authorization).

There are two approaches I see that would still retain usability with
AIF:

1. Wrap the AIF and some indicators for the extra data in some kind of
   "bag" structure.

2. Extend AIF such that a structure like this is permissible:

   [["/s/temp", 1/GET/], ["/a/led", 5/GET|PUT/],
    [CPA12345(null)/access error details/, true]]

3. Make up resources that represent the permissions. This is kind of
   viable for the error case (when assigning error instances a la
   /err/0001, permission to read through the indirection can imply
   permission to get it served directly), but I wouldn't know how to
   explain this for use case b.

All have in common that an AS that is unaware of the extra features can
still deal out the regular authorizations; 3 is even easy to add to any
AS that supports regular AIF.

Is any of those patterns already established, or has been explored in
parts?

Thanks
Christian

-- 
To use raw power is to make yourself infinitely vulnerable to greater powers.
  -- Bene Gesserit axiom

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Ace mailing list -- ace@ietf.org
To unsubscribe send an email to ace-le...@ietf.org

Reply via email to