Key Provisioning for Group Communication using ACE
draft-ietf-ace-key-groupcomm-18
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-26
|
18 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2024-01-26
|
18 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Derek Atkins was marked no-response |
2024-01-26
|
18 | Gunter Van de Velde | Request closed, assignment withdrawn: Jon Mitchell Last Call OPSDIR review |
2024-01-26
|
18 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue |
2024-01-22
|
18 | (System) | RFC Editor state changed to EDIT |
2024-01-22
|
18 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2024-01-22
|
18 | (System) | Announcement was received by RFC Editor |
2024-01-19
|
18 | (System) | IANA Action state changed to On Hold from In Progress |
2024-01-19
|
18 | (System) | IANA Action state changed to In Progress |
2024-01-19
|
18 | (System) | Removed all action holders (IESG state changed) |
2024-01-19
|
18 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2024-01-19
|
18 | Cindy Morgan | IESG has approved the document |
2024-01-19
|
18 | Cindy Morgan | Closed "Approve" ballot |
2024-01-19
|
18 | Cindy Morgan | Ballot approval text was generated |
2024-01-18
|
18 | Paul Wouters | revised ID was submitted, resolving ballot comments and directorate reviews. It also spend two weeks in the ACE WG soliciting feedback. |
2024-01-18
|
18 | Paul Wouters | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2024-01-16
|
18 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
2024-01-16
|
18 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-01-16
|
18 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-18.txt |
2024-01-16
|
18 | Marco Tiloca | New version accepted (logged-in submitter: Marco Tiloca) |
2024-01-16
|
18 | Marco Tiloca | Uploaded new revision |
2024-01-11
|
17 | Paul Wouters | IESG feedback requires a minor updated version |
2024-01-11
|
17 | (System) | Changed action holders to Francesca Palombini, Marco Tiloca (IESG state changed) |
2024-01-11
|
17 | Paul Wouters | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from Approved-announcement to be sent::AD Followup |
2023-11-30
|
17 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::AD Followup from IESG Evaluation |
2023-11-30
|
17 | Éric Vyncke | [Ballot comment] I am balloting ABSTAIN as I had no time to review it on my own, but I am trusting the IoT-directorate "almost ready" … [Ballot comment] I am balloting ABSTAIN as I had no time to review it on my own, but I am trusting the IoT-directorate "almost ready" review by Dave Thaler: https://datatracker.ietf.org/doc/review-ietf-ace-key-groupcomm-17-iotdir-telechat-thaler-2023-11-23/ Dave's review has identified issues in the security and IoT domains that I could not verify (lack of time) but it would help a lot if the authors replied to Dave's review. |
2023-11-30
|
17 | Éric Vyncke | [Ballot Position Update] New position, Abstain, has been recorded for Éric Vyncke |
2023-11-29
|
17 | Andrew Alston | [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston |
2023-11-29
|
17 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2023-11-29
|
17 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2023-11-29
|
17 | Warren Kumari | [Ballot comment] Thank you for writing this document - I found it both useful, and an easy read. I do have a nit / readability … [Ballot comment] Thank you for writing this document - I found it both useful, and an easy read. I do have a nit / readability suggestion: "New keying material is generated and distributed to the group upon membership changes (rekeying), if the application requires backward security (i.e., new group members must be prevented from accessing communications in the group prior to their joining) and forward security (i.e., former group members must be prevented from accessing communications in the group after their leaving)." I found this wording confusing - I think that it is the comma after "upon membership changes (rekeying)". This initially sounds like "new keys are generated on every membership change. If the application requires backward security then [something else / something additional". I *think* that just dropping the comma fixes it... You also have a typo: "It is REQUIRED of application profiles of this specificaton to" - specification. |
2023-11-29
|
17 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2023-11-28
|
17 | David Dong | IANA Experts State changed to Expert Reviews OK from Reviews assigned |
2023-11-28
|
17 | David Dong | The OAuth Parameters CBOR Mappings, the CoAP Content-Formats, and the OAuth Parameters registrations have been approved. Some comments for the Interface Description (if=) Link Target … The OAuth Parameters CBOR Mappings, the CoAP Content-Formats, and the OAuth Parameters registrations have been approved. Some comments for the Interface Description (if=) Link Target Attribute Values registration: The registration of this if= type is fundamentally appropriate. However, there are some aspects of its description that could use improvement. * The description uses the term ‘ace group’ to stand for ace.group. That could be confusing, but probably will not lead to interoperability problems. * The description could be pointing to Section 4.1 (of course, a search will also find that section). * Section 4.1 defines a number of resources. Which of these is the one that the link marked if= should point to? One might think that it is the one named /ace-group as an example, and not the individual ones named /ace-group/GROUPNAME. However, the examples in draft-tiloca-core-oscore-discovery indicate otherwise. It would be preferable to make the answer to this question explicit in ace-key-groupcomm (an example for such a link in ace-key-groupcomm would also help). Deferring much of the actual definition of the if= type to draft-tiloca-core-oscore-discovery while already registering it here does not work very well for this specification reader. |
2023-11-28
|
17 | Martin Duke | [Ballot comment] Thanks to Vidhi Goel for the TSVART review. (2) "If it consists of an explicit entity such as a pub-sub Broker or a … [Ballot comment] Thanks to Vidhi Goel for the TSVART review. (2) "If it consists of an explicit entity such as a pub-sub Broker or a message relayer, the Dispatcher is comparable to an untrusted on-path intermediary, and as such it is able to read the messages sent by Clients in the group." Is this accurate? Why does the Dispatcher need the group key to relay messages? (3.3) s/since it allows to ask/since it allows the client to ask |
2023-11-28
|
17 | Martin Duke | [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke |
2023-11-28
|
17 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this document. Thanks Vidhi Goel for the TSVART review. However, I have noticed this review didn't get any responses … [Ballot comment] Thanks for working on this document. Thanks Vidhi Goel for the TSVART review. However, I have noticed this review didn't get any responses from the authors or wg. Please respond. I have hard time understanding the example used for individual keying material. what is this "member identifier" ? where is this defined? |
2023-11-28
|
17 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2023-11-28
|
17 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2023-11-24
|
17 | Erik Kline | [Ballot comment] # Internet AD comments for draft-ietf-ace-key-groupcomm-17 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Comments … [Ballot comment] # Internet AD comments for draft-ietf-ace-key-groupcomm-17 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Comments ### S6 * What is the real meaning behind: The KDC can perform a group rekeying before the current group keying material expires, unless it is acceptable or there are reasons to temporarily pause secure communications in the group, following the expiration of the current keying material. Specifically: when is it acceptable to "pause secure communications"? |
2023-11-24
|
17 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2023-11-23
|
17 | Dave Thaler | Request for Telechat review by IOTDIR Completed: Almost Ready. Reviewer: Dave Thaler. Sent review to list. |
2023-11-21
|
17 | David Dong | The OAuth Parameters CBOR Mappings, the CoAP Content-Formats, and the OAuth Parameters registrations have been approved. |
2023-11-20
|
17 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
2023-11-17
|
17 | Roman Danyliw | [Ballot comment] ** Section 1.1. Per the definition of “Group name” and GROUPNAME. The latter is defined as a “text string used in a URIs”. … [Ballot comment] ** Section 1.1. Per the definition of “Group name” and GROUPNAME. The latter is defined as a “text string used in a URIs”. The former has no definition beyond saying it is an identifier. Is it not a text string? ** Section 1.1. * Individual keying material: information exclusively pertaining to a group member, as associated with its group membership and related to other keying material and parameters used in the group. For example, this can be a member identifier that is unique within the group. -- unlike group and node identifier, member identifier is not defined -- how is a member identifier an example of “keying material”? Is it an identifier for a key? ** Section 2. Per the comment “Defined in the ACE framework” in Figure 2, which framework is this text referencing? This document? RFC9200? ** Section 3.1. Editorial * 'scope', specifying the name of the groups that the Client requests to access, Should this be “name_s_ of the groups ...”? Otherwise, it reads as if there is a single name for a collection of groups. ** Section 3.1 * 'audience', with an identifier of the KDC. The definition of audience from Section 5.8.1 of RFC9200 points to RFC8693 (OAuth’s definition of audience). It says: ==[ snip ]== The logical name of the target service where the client intends to use the requested security token. This serves a purpose similar to the resource parameter but with the client providing a logical name for the target service. Interpretation of the name requires that the value be something that both the client and the authorization server understand. ==[ snip ]== Does the application profile have to specify the semantics of this audience value (just like the scope parameter)? ** Section 5. 2. The node has been found compromised or is suspected so. What triggers this behavior in #2? How does the KDC know about compromise? Can Clients tell it that? Can a Client evict another Client? ** Section 6.2.1. Reading this text as normative guidance seemed odd since the parent section 6.2 stated that the specifics of one-to-many is effectively out of scope and this document only provides high level guidance. ** Section 10. Security considerations are inherited from the ACE framework [RFC9200], and from the specific transport profile of ACE used between the Clients and the KDC, e.g., [RFC9202] and [RFC9203]. And from application profiles too which specify the details of the keys and tokens? ** Section 10 Unless otherwise defined by an application profile of this specification, the KDC SHOULD renew the group keying material upon a group membership change. ... Instead, the KDC might rekey the group after a minimum number of group members have joined or left within a given time interval, or after a maximum amount of time since the last group rekeying was completed, or yet during predictable network inactivity periods. The first sentence seems to be encouraging rekeying but subsequent text points out that this might not be reasonable. Should the initial “SHOULD” text be harmonized with this other more nuanced guidance? ** Typos -- Section 1. Typo. s/recommeded/recommended/ -- Section 2. Typo. s/membrs/members/ -- Section 3.1. Typo. s/ specificaton/specification/ -- Section 3.3.1. Typo. s/acces/access/ -- Section 4. Typo. s/trasferring/transferring/ |
2023-11-17
|
17 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2023-11-06
|
17 | David Dong | The OAuth Parameters CBOR Mappings registrations have been approved. The CoAP Content-Formats registration have also been approved with a nit: if the authors want the … The OAuth Parameters CBOR Mappings registrations have been approved. The CoAP Content-Formats registration have also been approved with a nit: if the authors want the entry names can be updated per the erratum on RFC 7252, i.e. change to: Content Type: application/ace-groupcomm+cbor Content Coding: - |
2023-11-04
|
17 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Dave Thaler |
2023-11-04
|
17 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Geoffrey Mulligan was rejected |
2023-11-02
|
17 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Geoffrey Mulligan |
2023-11-02
|
17 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Terry Manderson was rejected |
2023-10-31
|
17 | Henry Thompson | Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Henry Thompson. Sent review to list. |
2023-10-31
|
17 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Terry Manderson |
2023-10-31
|
17 | Mališa Vučinić | Assignment of request for Telechat review by IOTDIR to Mališa Vučinić was rejected |
2023-10-30
|
17 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Mališa Vučinić |
2023-10-30
|
17 | Éric Vyncke | Requested Telechat review by IOTDIR |
2023-10-23
|
17 | Cindy Morgan | Placed on agenda for telechat - 2023-11-30 |
2023-10-23
|
17 | Francesca Palombini | [Ballot comment] It is mine |
2023-10-23
|
17 | Francesca Palombini | [Ballot Position Update] New position, Recuse, has been recorded for Francesca Palombini |
2023-10-22
|
17 | Paul Wouters | Ballot has been issued |
2023-10-22
|
17 | Paul Wouters | Ballot writeup was changed |
2023-10-22
|
17 | Paul Wouters | Ballot has been issued |
2023-10-22
|
17 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
2023-10-22
|
17 | Paul Wouters | Created "Approve" ballot |
2023-10-22
|
17 | Paul Wouters | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2023-10-20
|
17 | David Dong | The CoAP Content-Formats registration is approved with a nit: Nit: if the authors want the entry names can be updated per the erratum on RFC … The CoAP Content-Formats registration is approved with a nit: Nit: if the authors want the entry names can be updated per the erratum on RFC 7252, i.e. change to: Content Type: application/ace-groupcomm+cbor Content Coding: - |
2023-10-20
|
17 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2023-10-19
|
17 | David Dong | IANA Experts State changed to Reviews assigned |
2023-10-19
|
17 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2023-10-19
|
17 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-ace-key-groupcomm-17. If any part of this review is inaccurate, please let us know. IANA … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-ace-key-groupcomm-17. If any part of this review is inaccurate, please let us know. IANA has a question about the tenth action requested in the IANA Considerations section of this document. IANA also has a comment regarding the Description for one of the registrations in the ninth action requested. IANA understands that, upon approval of this document, there are twelve actions which we must complete. First, in the application namespace of the Media Types registry located at: https://www.iana.org/assignments/media-types/ a single new registration will be made as follows: Name: ace-groupcomm+cbor Template: [ TBD-at-Registration ] Reference: [ RFC-to-be ] Second, in the CoAP Content-Formats registry in the Constrained RESTful Environments (CoRE) Parameters registry group located at: https://www.iana.org/assignments/core-parameters/ a single new registration will be made as follows: Content Type: application/ace-groupcomm+cbor Content Coding: ID: [ TBD-at-Registration ] Reference: [ RFC-to-be ] IANA understands that this registration will be from the 0-255 range in the Content-Formats registry. As this requests a registration in an Expert Review or Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Third, in the OAuth Parameters registry in the OAuth Parameters registry group located at: https://www.iana.org/assignments/oauth-parameters/ two new parameters will be registered as follows: Name: sign_info Parameter Usage Location: client-rs request, rs-client response Change Controller: IETF Reference: [ RFC-to-be ] Name: kdcchallenge Parameter Usage Location: rs-client response Change Controller: IETF Reference: [ RFC-to-be ] As this also requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Fourth, in the OAuth Parameters CBOR Mappings registry in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ two new mappings will be registered as follows: Name: sign_info CBOR Key: [ TBD-at-Registration ] Value Type: Simple value "null" / array Reference: [ RFC-to-be ] Name: kdcchallenge CBOR Key: [ TBD-at-Registration ] Value Type: Byte string Reference: [ RFC-to-be ] We note that the authors have requested for values in the -256 to 255 range. As this also requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Fifth, in the Interface Description (if=) Link Target Attribute Values registry in the Constrained RESTful Environments (CoRE) Parameters registry group located at: https://www.iana.org/assignments/core-parameters/ a single new registration is to be made as follows: Value: ace.group Description: The 'ace group' interface is used to provision keying material and related information and policies to members of a group using the ACE framework. Reference: [ RFC-to-be ] Note: As this also requests a registration in an Expert Review or Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." Sixth, a new registry is to be created called the ACE Groupcomm Parameters registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have four columns: Name, CBOR Key, CBOR Type, and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review Text strings of length 1: Standards Action With Expert Review Text strings of length 2: Specification Required Text strings of length greater than 2: Expert Review There are initial registrations in the new registry as follows: | Name | CBOR Key | CBOR Type | Reference | +------+-----------+------------+-----------+ | error | TBD | int | [ RFC-to-be ] | | error_description | TBD | tstr | [ RFC-to-be ] | | gid | TBD | array | [ RFC-to-be ] | | gname | TBD | array of tstr | [ RFC-to-be ] | | guri | TBD | array of tstr | [ RFC-to-be ] | | scope | TBD | bstr | [ RFC-to-be ] | | get_creds | TBD | array / Simple value "null" | [ RFC-to-be ] | | client_cred | TBD | bstr | [ RFC-to-be ] | | cnonce | TBD | bstr | [ RFC-to-be ] | | client_cred_verify | TBD | bstr | [ RFC-to-be ] | | creds_repo | TBD | tstr | [ RFC-to-be ] | | control_uri | TBD | tstr | [ RFC-to-be ] | | gkty | TBD | int / tstr | [ RFC-to-be ] | | key | TBD | See the "ACE Groupcomm Key Types" registry | [ RFC-to-be ] | | num | TBD | int | [ RFC-to-be ] | | ace_groupcomm_profile | TBD | int | [ RFC-to-be ] | | exp | TBD | int | [ RFC-to-be ] | | creds | TBD | array | [ RFC-to-be ] | | peer_roles | TBD | array | [ RFC-to-be ] | | peer_identifiers | TBD | array | [ RFC-to-be ] | | group_policies | TBD | map | [ RFC-to-be ] | | kdc_cred | TBD | bstr | [ RFC-to-be ] | | kdc_nonce | TBD | bstr | [ RFC-to-be ] | | kdc_cred_verify | TBD | bstr | [ RFC-to-be ] | | rekeying_scheme | TBD | int | [ RFC-to-be ] | | mgt_key_material | TBD | bstr | [ RFC-to-be ] | | control_group_uri | TBD | tstr | [ RFC-to-be ] | | sign_info | TBD | array | [ RFC-to-be ] | | kdcchallenge | TBD | bstr | [ RFC-to-be ] | Seventh, a new registry is to be created called the ACE Groupcomm Key Types registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have five columns: Name, Key Type Value, Profile, Description, and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review Text strings of length 1: Standards Action With Expert Review Text strings of length 2: Specification Required Text strings of length greater than 2: Expert Review There is an initial registration in the new registry as follows: Name: Reserved Key Type Value: 0 Profile: Description: This value is reserved Reference: [ RFC-to-be ] Eighth, a new registry is to be created called the ACE Groupcomm Profiles registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have four columns: Name, Description, CBOR Value, and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review There is an initial registration in the new registry as follows: Name: Reserved Description: This value is reserved CBOR Value: 0 Reference: [ RFC-to-be ] Ninth, a new registry is to be created called the ACE Groupcomm Policies registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have five columns: Name, CBOR Label, CBOR Type. Description, and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review Text strings of length 1: Standards Action With Expert Review Text strings of length greater than 2: Expert Review Text strings of length 2: Specification Required There are initial registrations in the new registry as follows: Name: Sequence Number Synchronization Method CBOR label: TBD CBOR type: tstr/int Description: Method for recipient group members to synchronize with sequence numbers of sender group members. Its value is taken from the 'Value' column of the Sequence Number Synchronization Method registry Reference: [ RFC-to-be ] IANA Comment -> In the IANA Considerations section of this document, there appears to be an extra "of" in the first sentence of the Description for this registration. Name: Key Update Check Interval CBOR label: TBD CBOR type: int Description: Polling interval in seconds, for group members to check at the KDC if the latest group keying material is the one that they store Reference: [ RFC-to-be ] Name: Expiration Delta CBOR label: TBD CBOR type: uint Description: Number of seconds from 'exp' until a UTC date/time, after which group members MUST stop using the group keying material that they store to decrypt incoming messages Reference: [ RFC-to-be ] Tenth, a new registry is to be created called the Sequence Number Synchronization Methods registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have four columns: Name, Value, Description, and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review Text strings of length 1: Standards Action With Expert Review Text strings of length 2: Specification Required Text strings of length greater than 2: Expert Review IANA Question --> Are there any initial values to populate the new Sequence Number Synchronization Methods registry? Eleventh, a new registry is to be created called the ACE Groupcomm Errors registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have three columns: Value, Description and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review There are initial registrations in the new registry as follows: | Value | Description | Reference | +------+------------+-----------+ | 0 | Operation permitted only to group members | [ RFC-to-be ] | | 1 | Request inconsistent with the current roles | [ RFC-to-be ] | | 2 | Authentication credential incompatible with the group configuration | [ RFC-to-be ] | | 3 | Invalid proof-of-possession evidence | [ RFC-to-be ] | | 4 | No available node identifiers | [ RFC-to-be ] | | 5 | Group membership terminated | [ RFC-to-be ] | | 6 | Group deleted | [ RFC-to-be ] | Twelveth, a new registry is to be created called the ACE Groupcomm Rekeying Schemes registry. The new registry will be located in the Authentication and Authorization for Constrained Environments (ACE) registry group located at: https://www.iana.org/assignments/ace/ The registry will have four columns: Value, Name, Description and Reference. The registration policy for the new registry is as follows: Integer values less than -65536: Private Use Integer values from -65536 to -257: Specification Required Integer values from -256 to 255: Standards Action With Expert Review Integer values from 256 to 65535: Specification Required Integer values greater than 65535: Expert Review There is an initial registration in the new registry as follows: Value: 0 Name: Point-to-Point Description: The KDC individually targets each node to rekey, using the pairwise secure communication association with that node Reference: [ RFC-to-be ] We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2023-10-13
|
17 | Vidhi Goel | Request for Last Call review by TSVART Completed: Ready with Nits. Reviewer: Vidhi Goel. Sent review to list. Submission of review completed at an earlier … Request for Last Call review by TSVART Completed: Ready with Nits. Reviewer: Vidhi Goel. Sent review to list. Submission of review completed at an earlier date. |
2023-10-13
|
17 | Vidhi Goel | Request for Last Call review by TSVART Completed: Ready with Nits. Reviewer: Vidhi Goel. |
2023-10-13
|
17 | Thomas Fossati | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Thomas Fossati. Sent review to list. |
2023-10-12
|
17 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Derek Atkins |
2023-10-12
|
17 | Jean Mahoney | Request for Last Call review by GENART is assigned to Thomas Fossati |
2023-10-12
|
17 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2023-10-10
|
17 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Vidhi Goel |
2023-10-10
|
17 | Kyle Rose | Assignment of request for Last Call review by TSVART to Kyle Rose was rejected |
2023-10-09
|
17 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Kyle Rose |
2023-10-09
|
17 | Magnus Westerlund | Assignment of request for Last Call review by TSVART to Gorry Fairhurst was rejected |
2023-10-09
|
17 | Magnus Westerlund | Request for Last Call review by TSVART is assigned to Gorry Fairhurst |
2023-10-07
|
17 | Barry Leiba | Request for Last Call review by ARTART is assigned to Henry Thompson |
2023-10-06
|
17 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2023-10-06
|
17 | Cindy Morgan | The following Last Call announcement was sent out (ends 2023-10-20): From: The IESG To: IETF-Announce CC: ace-chairs@ietf.org, ace@ietf.org, draft-ietf-ace-key-groupcomm@ietf.org, mglt.ietf@gmail.com, paul.wouters@aiven.io … The following Last Call announcement was sent out (ends 2023-10-20): From: The IESG To: IETF-Announce CC: ace-chairs@ietf.org, ace@ietf.org, draft-ietf-ace-key-groupcomm@ietf.org, mglt.ietf@gmail.com, paul.wouters@aiven.io Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Key Provisioning for Group Communication using ACE) to Proposed Standard The IESG has received a request from the Authentication and Authorization for Constrained Environments WG (ace) to consider the following document: - 'Key Provisioning for Group Communication using ACE' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2023-10-20. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members acting as Clients and authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document, as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-ace-key-groupcomm/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc7967: Constrained Application Protocol (CoAP) Option for No Server Response (Informational - Independent Submission) rfc9053: CBOR Object Signing and Encryption (COSE): Initial Algorithms (Informational - Internet Engineering Task Force (IETF)) |
2023-10-06
|
17 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2023-10-06
|
17 | Paul Wouters | Last call was requested |
2023-10-06
|
17 | Paul Wouters | Ballot approval text was generated |
2023-10-06
|
17 | Paul Wouters | Ballot writeup was generated |
2023-10-06
|
17 | Paul Wouters | IESG state changed to Last Call Requested from Publication Requested::AD Followup |
2023-10-06
|
17 | Paul Wouters | Last call announcement was generated |
2023-10-06
|
17 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
2023-10-06
|
17 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2023-10-06
|
17 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-17.txt |
2023-10-06
|
17 | Marco Tiloca | New version accepted (logged-in submitter: Marco Tiloca) |
2023-10-06
|
17 | Marco Tiloca | Uploaded new revision |
2023-08-31
|
16 | (System) | Changed action holders to Francesca Palombini, Marco Tiloca (IESG state changed) |
2023-08-31
|
16 | Paul Wouters | IESG state changed to Publication Requested::Revised I-D Needed from Publication Requested |
2022-09-05
|
16 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-16.txt |
2022-09-05
|
16 | Marco Tiloca | New version accepted (logged-in submitter: Marco Tiloca) |
2022-09-05
|
16 | Marco Tiloca | Uploaded new revision |
2022-03-23
|
15 | Amy Vezza | Shepherding AD changed to Paul Wouters |
2022-02-02
|
15 | Daniel Migault | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The type is standard track which is appropriated as it defines a framework on which profile will be derived and need to be inter-operable. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members acting as Clients and authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document, as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified. Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? no controversy. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This draft in itself cannot be implemented. The API and message template formats that it defines have to be instantiated by its profiles (such as key-groupcomm-oscore), which can rather be implemented. The latest has been implemented in the java ACE implementation for Californium https://bitbucket.org/marco-tiloca-sics/ace-java/ Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Daniel Migault is the document shepherd and Benjamin Kaduk is the responsible AD (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I reviewed some former version of this document and requested some other reviewers to go through the various versions. I believe the document is ready. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? yes, confirmation has been made on the mailing list (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I believe we have been to a sufficient number of reviews to declare consenus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) -- Looks like a reference, but probably isn't: '01' on line 1264 -- Looks like a reference, but probably isn't: '02' on line 1264 == Outdated reference: A later version (-04) exists of draft-ietf-ace-aif-03 ** Downref: Normative reference to an Informational draft: draft-ietf-ace-aif (ref. 'I-D.ietf-ace-aif') -- Possible downref: Normative reference to a draft: ref. 'I-D.ietf-cose-countersign' ** Downref: Normative reference to an Informational draft: draft-ietf-cose-rfc8152bis-algs (ref. 'I-D.ietf-cose-rfc8152bis-algs') -- Possible downref: Normative reference to a draft: ref. 'I-D.ietf-cose-rfc8152bis-struct' ** Downref: Normative reference to an Informational RFC: RFC 7967 Summary: 3 errors (**), 0 flaws (~~), 2 warnings (==), 5 comments (--). Run idnits with the --verbose option for more detailed information about the items above. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains a media type, uris but this is pretty much mainstream in this group, so I do not believe additional reviews are needed. (13) Have all references within this document been identified as either normative or informative? yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? the document is waiting for: * -aif that has already been sent to the IESG * -ace-oauth-authz in the RFC editor queue * -cose-rfc8152bis-struct in the RFC Editor queue I think it would be good to have key-groupcom and key-groupcom-oscore being shipped together and the latter is in WGLC. (15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. possible downref are: * -aif ( now moved to standard track) * -cose-countersign which is standard track but in a draft state * -cose-rfc8152bis-struct whihc is standard track but in a draft state * -cose-rfc8152bis-algs which is informational as it describes algorithms (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The IANA section seems correct. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. the following registries are to be created.: * ACE Groupcomm Parameters * ACE Groupcomm Key Types * ACE Groupcomm Profiles * ACE Groupcomm Policies * Sequence Number Synchronization Methods * ACE Scope Semantics * ACE Groupcomm Errors * ACE Groupcomm Rekeying Schemes Marco Tiloca, Cigdem Sengul are probably good candidates (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. nits. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? na |
2022-02-02
|
15 | Daniel Migault | Responsible AD changed to Benjamin Kaduk |
2022-02-02
|
15 | Daniel Migault | IETF WG state changed to Submitted to IESG for Publication from Waiting for WG Chair Go-Ahead |
2022-02-02
|
15 | Daniel Migault | IESG state changed to Publication Requested from I-D Exists |
2022-02-02
|
15 | Daniel Migault | IESG process started in state Publication Requested |
2022-02-02
|
15 | Daniel Migault | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The type is standard track which is appropriated as it defines a framework on which profile will be derived and need to be inter-operable. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members acting as Clients and authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document, as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified. Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? no controversy. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This draft in itself cannot be implemented. The API and message template formats that it defines have to be instantiated by its profiles (such as key-groupcomm-oscore), which can rather be implemented. The latest has been implemented in the java ACE implementation for Californium https://bitbucket.org/marco-tiloca-sics/ace-java/ Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Daniel Migault is the document shepherd and Benjamin Kaduk is the responsible AD (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I reviewed some former version of this document and requested some other reviewers to go through the various versions. I believe the document is ready. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? yes, confirmation has been made on the mailing list (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I believe we have been to a sufficient number of reviews to declare consenus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) -- Looks like a reference, but probably isn't: '01' on line 1264 -- Looks like a reference, but probably isn't: '02' on line 1264 == Outdated reference: A later version (-04) exists of draft-ietf-ace-aif-03 ** Downref: Normative reference to an Informational draft: draft-ietf-ace-aif (ref. 'I-D.ietf-ace-aif') -- Possible downref: Normative reference to a draft: ref. 'I-D.ietf-cose-countersign' ** Downref: Normative reference to an Informational draft: draft-ietf-cose-rfc8152bis-algs (ref. 'I-D.ietf-cose-rfc8152bis-algs') -- Possible downref: Normative reference to a draft: ref. 'I-D.ietf-cose-rfc8152bis-struct' ** Downref: Normative reference to an Informational RFC: RFC 7967 Summary: 3 errors (**), 0 flaws (~~), 2 warnings (==), 5 comments (--). Run idnits with the --verbose option for more detailed information about the items above. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains a media type, uris but this is pretty much mainstream in this group, so I do not believe additional reviews are needed. (13) Have all references within this document been identified as either normative or informative? yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? the document is waiting for: * -aif that has already been sent to the IESG * -ace-oauth-authz in the RFC editor queue * -cose-rfc8152bis-struct in the RFC Editor queue I think it would be good to have key-groupcom and key-groupcom-oscore being shipped together and the latter is in WGLC. (15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. possible downref are: * -aif ( now moved to standard track) * -cose-countersign which is standard track but in a draft state * -cose-rfc8152bis-struct whihc is standard track but in a draft state * -cose-rfc8152bis-algs which is informational as it describes algorithms (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The IANA section seems correct. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. the following registries are to be created.: * ACE Groupcomm Parameters * ACE Groupcomm Key Types * ACE Groupcomm Profiles * ACE Groupcomm Policies * Sequence Number Synchronization Methods * ACE Scope Semantics * ACE Groupcomm Errors * ACE Groupcomm Rekeying Schemes Marco Tiloca, Cigdem Sengul are probably good candidates (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. nits. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? na |
2022-02-02
|
15 | Daniel Migault | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The type is standard track which is appropriated as it defines a framework on which profile will be derived and need to be inter-operable. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members acting as Clients and authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document, as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified. Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? no controversy. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This draft in itself cannot be implemented. The API and message template formats that it defines have to be instantiated by its profiles (such as key-groupcomm-oscore), which can rather be implemented. The latest has been implemented in the java ACE implementation for Californium https://bitbucket.org/marco-tiloca-sics/ace-java/ Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Daniel Migault is the document shepherd and Benjamin Kaduk is the responsible AD (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I reviewed some former version of this document and requested some other reviewers to go through the various versions. I believe the document is ready. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? yes, confirmation has been made on the mailing list (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I believe we have been to a sufficient number of reviews to declare consenus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. XXX (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains a media type, uris but this is pretty much mainstream in this group, so I do not believe additional reviews are needed. (13) Have all references within this document been identified as either normative or informative? yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? the document is waiting for: * -aif that has already been sent to the IESG * -ace-oauth-authz in the RFC editor queue * -cose-rfc8152bis-struct in the RFC Editor queue I think it would be good to have key-groupcom and key-groupcom-oscore being shipped together and the latter is in WGLC. (15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. XXX possible downref are: * -aif ( this is likely an error) * -cose-countersign which is standard track but in a draft state * -cose-rfc8152bis-struct whihc is standard track but in a draft state * -cose-rfc8152bis-algs which is informational as it describes algorithms (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The IANA section seems correct. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. the following registries are to be created.: * ACE Groupcomm Parameters * ACE Groupcomm Key Types * ACE Groupcomm Profiles * ACE Groupcomm Policies * Sequence Number Synchronization Methods * ACE Scope Semantics * ACE Groupcomm Errors * ACE Groupcomm Rekeying Schemes Marco Tiloca, Cigdem Sengul are probably good candidates (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. nits. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? na |
2021-12-23
|
15 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-15.txt |
2021-12-23
|
15 | (System) | New version accepted (logged-in submitter: Marco Tiloca) |
2021-12-23
|
15 | Marco Tiloca | Uploaded new revision |
2021-12-22
|
14 | Daniel Migault | Tag Doc Shepherd Follow-up Underway set. |
2021-12-22
|
14 | Daniel Migault | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2021-12-22
|
14 | Daniel Migault | Changed consensus to Yes from Unknown |
2021-12-22
|
14 | Daniel Migault | Intended Status changed to Proposed Standard from None |
2021-12-22
|
14 | Daniel Migault | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 1 November 2019. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The type is standard track which is appropriated as it defines a framework on which profile will be derived and need to be inter-operable. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document defines how to use the Authentication and Authorization for Constrained Environments (ACE) framework to distribute keying material and configuration parameters for secure group communication. Candidate group members acting as Clients and authorized to join a group can do so by interacting with a Key Distribution Center (KDC) acting as Resource Server, from which they obtain the keying material to communicate with other group members. While defining general message formats as well as the interface and operations available at the KDC, this document supports different approaches and protocols for secure group communication. Therefore, details are delegated to separate application profiles of this document, as specialized instances that target a particular group communication approach and define how communications in the group are protected. Compliance requirements for such application profiles are also specified. Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary: Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? no controversy. Document Quality: Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, YANG Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? This draft in itself cannot be implemented. The API and message template formats that it defines have to be instantiated by its profiles (such as key-groupcomm-oscore), which can rather be implemented. The latest has been implemented in the java ACE implementation for Californium https://bitbucket.org/marco-tiloca-sics/ace-java/ Personnel: Who is the Document Shepherd? Who is the Responsible Area Director? Daniel Migault is the document shepherd and Benjamin Kaduk is the responsible AD (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I reviewed some former version of this document and requested some other reviewers to go through the various versions. I believe the document is ready. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. no (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? XXX (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? I believe we have been to a sufficient number of reviews to declare consenus. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) no (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. XXX (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains a media type, uris but this is pretty much mainstream in this group, so I do not believe additional reviews are needed. (13) Have all references within this document been identified as either normative or informative? yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? the document is waiting for: * -aif that has already been sent to the IESG * -ace-oauth-authz in the RFC editor queue * -cose-rfc8152bis-struct in the RFC Editor queue I think it would be good to have key-groupcom and key-groupcom-oscore being shipped together and the latter is in WGLC. (15) Are there downward normative references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. XXX possible downref are: * -aif ( this is likely an error) * -cose-countersign which is standard track but in a draft state * -cose-rfc8152bis-struct whihc is standard track but in a draft state * -cose-rfc8152bis-algs which is informational as it describes algorithms (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. no (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 8126). The IANA section seems correct. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. the following registries are to be created.: * ACE Groupcomm Parameters * ACE Groupcomm Key Types * ACE Groupcomm Profiles * ACE Groupcomm Policies * Sequence Number Synchronization Methods * ACE Scope Semantics * ACE Groupcomm Errors * ACE Groupcomm Rekeying Schemes Marco Tiloca, Cigdem Sengul are probably good candidates (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, YANG modules, etc. nits. (20) If the document contains a YANG module, has the module been checked with any of the recommended validation tools (https://trac.ietf.org/trac/ops/wiki/yang-review-tools) for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC8342? na |
2021-12-22
|
14 | Daniel Migault | Notification list changed to mglt.ietf@gmail.com because the document shepherd was set |
2021-12-22
|
14 | Daniel Migault | Document shepherd changed to Daniel Migault |
2021-10-25
|
14 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-14.txt |
2021-10-25
|
14 | (System) | New version accepted (logged-in submitter: Marco Tiloca) |
2021-10-25
|
14 | Marco Tiloca | Uploaded new revision |
2021-08-30
|
13 | Daniel Migault | IETF WG state changed to In WG Last Call from WG Document |
2021-07-12
|
13 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-13.txt |
2021-07-12
|
13 | (System) | New version accepted (logged-in submitter: Marco Tiloca) |
2021-07-12
|
13 | Marco Tiloca | Uploaded new revision |
2021-05-11
|
12 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-12.txt |
2021-05-11
|
12 | (System) | New version accepted (logged-in submitter: Marco Tiloca) |
2021-05-11
|
12 | Marco Tiloca | Uploaded new revision |
2021-02-22
|
11 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-11.txt |
2021-02-22
|
11 | (System) | New version approved |
2021-02-22
|
11 | (System) | Request for posting confirmation emailed to previous authors: Francesca Palombini , Marco Tiloca |
2021-02-22
|
11 | Marco Tiloca | Uploaded new revision |
2020-11-02
|
10 | Francesca Palombini | New version available: draft-ietf-ace-key-groupcomm-10.txt |
2020-11-02
|
10 | (System) | New version approved |
2020-11-02
|
10 | (System) | Request for posting confirmation emailed to previous authors: Marco Tiloca , Francesca Palombini |
2020-11-02
|
10 | Francesca Palombini | Uploaded new revision |
2020-11-02
|
10 | Francesca Palombini | Uploaded new revision |
2020-09-04
|
09 | Francesca Palombini | New version available: draft-ietf-ace-key-groupcomm-09.txt |
2020-09-04
|
09 | (System) | New version approved |
2020-09-04
|
09 | (System) | Request for posting confirmation emailed to previous authors: Marco Tiloca , Francesca Palombini |
2020-09-04
|
09 | Francesca Palombini | Uploaded new revision |
2020-09-04
|
09 | Francesca Palombini | Uploaded new revision |
2020-07-15
|
08 | Jim Schaad | Added to session: IETF-108: ace Wed-1100 |
2020-07-13
|
08 | Francesca Palombini | New version available: draft-ietf-ace-key-groupcomm-08.txt |
2020-07-13
|
08 | (System) | New version approved |
2020-07-13
|
08 | (System) | Request for posting confirmation emailed to previous authors: Francesca Palombini , Marco Tiloca |
2020-07-13
|
08 | Francesca Palombini | Uploaded new revision |
2020-07-13
|
08 | Francesca Palombini | Uploaded new revision |
2020-06-18
|
07 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-07.txt |
2020-06-18
|
07 | (System) | New version approved |
2020-06-18
|
07 | (System) | Request for posting confirmation emailed to previous authors: Francesca Palombini , Marco Tiloca |
2020-06-18
|
07 | Marco Tiloca | Uploaded new revision |
2020-05-11
|
06 | Francesca Palombini | New version available: draft-ietf-ace-key-groupcomm-06.txt |
2020-05-11
|
06 | (System) | New version approved |
2020-05-11
|
06 | (System) | Request for posting confirmation emailed to previous authors: Francesca Palombini , Marco Tiloca |
2020-05-11
|
06 | Francesca Palombini | Uploaded new revision |
2020-05-11
|
06 | Francesca Palombini | Uploaded new revision |
2020-03-09
|
05 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-05.txt |
2020-03-09
|
05 | (System) | New version accepted (logged-in submitter: Marco Tiloca) |
2020-03-09
|
05 | Marco Tiloca | Uploaded new revision |
2020-01-15
|
04 | Francesca Palombini | New version available: draft-ietf-ace-key-groupcomm-04.txt |
2020-01-15
|
04 | (System) | New version approved |
2020-01-15
|
04 | (System) | Request for posting confirmation emailed to previous authors: Marco Tiloca , Francesca Palombini |
2020-01-15
|
04 | Francesca Palombini | Uploaded new revision |
2019-11-04
|
03 | Francesca Palombini | New version available: draft-ietf-ace-key-groupcomm-03.txt |
2019-11-04
|
03 | (System) | New version approved |
2019-11-04
|
03 | (System) | Request for posting confirmation emailed to previous authors: Marco Tiloca , Francesca Palombini |
2019-11-04
|
03 | Francesca Palombini | Uploaded new revision |
2019-11-04
|
03 | Francesca Palombini | Uploaded new revision |
2019-07-05
|
02 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-02.txt |
2019-07-05
|
02 | (System) | |
2019-07-05
|
02 | (System) | Request for posting confirmation emailed to previous authors: Marco Tiloca , Francesca Palombini |
2019-07-05
|
02 | Marco Tiloca | Uploaded new revision |
2019-03-08
|
01 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-01.txt |
2019-03-08
|
01 | (System) | New version approved |
2019-03-08
|
01 | (System) | Request for posting confirmation emailed to previous authors: Marco Tiloca , Francesca Palombini |
2019-03-08
|
01 | Marco Tiloca | Uploaded new revision |
2018-12-20
|
00 | Jim Schaad | This document now replaces draft-palombini-ace-key-groupcomm instead of None |
2018-12-20
|
00 | Marco Tiloca | New version available: draft-ietf-ace-key-groupcomm-00.txt |
2018-12-20
|
00 | (System) | WG -00 approved |
2018-12-20
|
00 | Marco Tiloca | Set submitter to "Marco Tiloca ", replaces to draft-palombini-ace-key-groupcomm and sent approval email to group chairs: ace-chairs@ietf.org |
2018-12-20
|
00 | Marco Tiloca | Uploaded new revision |