[Last-Call] draft-ietf-core-oscore-groupcomm-26 ietf last call Tsvart review

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Document: draft-ietf-core-oscore-groupcomm
Title: Group Object Security for Constrained RESTful Environments (Group OSCORE)
Reviewer: Joerg Ott
Review result: Ready with Issues

This document has been reviewed as part of the transport area review team's
ongoing effort to review key IETF documents. These comments were written
primarily for the transport area directors, but are copied to the document's
authors and WG to allow them to address any issues raised and also to the IETF
discussion list for information.

When done at the time of IETF Last Call, the authors should consider this
review as part of the last-call comments they receive. Please always CC
tsv-art@xxxxxxxx if you reply to or forward this review.

Let me note up front that, for this tsv-art review, I am not able to read all
accompanying documentation to understand all subtleties and mechanisms that 
may be provided elsewhere or obvious to those deep into OSCORE.

The present I-D defines additions to security contexts in an OSCORE environment
for the purpose of enabling secure multicast-based group communication paired
with point-to-point messaging between group members.  As such, the document 
mostly defines security mechanisms and only touches transport aspects in a few
places.  This tsv-art review naturally focuses on the latter.

Section 8.1, 2nd para

"Typically, the sender endpoint sends the message protected in pairwise mode
over unicast [...]." 

This may be read to suggest that such requests could also be sent via multicast,
which may not (or may?) be desirable.  The two remaining paragraphs in section
8.1 don't help resolving this issue (actually, to me, they seem to create more
questions than they answer).

Section 12.1: "Communications that the Group Manager has with joining endpoints
MUST be secured. Specific details on how to secure such communications are out
of the scope of this document."

Should one have the (normative?) reference to ietf-ace-key-groupcomm-oscore 
earlier and more explicit?

Section 12.2, 2nd para states that "when possible, the delivery of rekeying
messages should use a reliable transport [...]"

This seems to suggest that an unreliable -- and possibly non-congestion
controlled -- transport is fine, too.  This appears risky if rapid membership
changes occur or are suggested in some way as this could cause floods of
rekeying messages.  Especially since (4th para), "The Group Manager MUST rekey
the group without undue delay when one or more endpoints leave the group."

Since member may be evicted is they are suspicious, could such suspicion be
caused by an adversary and thereby mount a flooding or denial of service
attack?


Let me finally not that the group manager is defined as an abstract concept,
well, a function, to exercised by some entity inside or outside the group.
This is a good abstraction but I am wondering where rendezvous mechanisms,
which may or may not have transport and security implications, are defined.
Would the group manager be (auto)configured?  The group manager also appears
as a single point of failure and neither this document not the referenced
draft-ietf-ace-key-groupcomm-oscore-17 appears to discuss such aspects.
Here, I may just miss the overarching context but it might appear useful
to include some minimalist material to this end.

As I wrote above, this may all be discussed or handled elsewhere.

Nits:
Section 12. intro: "According to a hierarchical approach, ..." -- reword?

Section 12.2. 1st para: should -> SHOULD ?

Best,
Jörg



-- 
last-call mailing list -- last-call@xxxxxxxx
To unsubscribe send an email to last-call-leave@xxxxxxxx




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Mhonarc]     [Fedora Users]

  Powered by Linux