<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-amsuess-ace-brski-ace-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.4 -->
  <front>
    <title abbrev="BRSKI for ACE">Provisioning ACE credentials through BRSKI</title>
    <seriesInfo name="Internet-Draft" value="draft-amsuess-ace-brski-ace-00"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2023" month="July" day="07"/>
    <workgroup>ace</workgroup>
    <keyword>ace</keyword>
    <keyword>brski</keyword>
    <keyword>est</keyword>
    <keyword>onboarding</keyword>
    <abstract>
      <t>The autonomous onboarding mechanisms defined in ANIMA's voucher artifact
and the BRSKI protocol
provide a means of onboarding a device (the pledge) onto a PKI managed domain.
This document extends the voucher with expressions for onboarding it into a domain managed through ACE.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Authentication and Authorization for Constrained Environments Working Group mailing list (ace@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/ace/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://gitlab.com/chrysn/brski-ace"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>[ See abstract. ]</t>
      <t>The main application pattern considered for this kind of enrollment is <xref target="authz"/>:
After basic networking services (possibly link-local when used in combination with CoJP as in <xref section="A" sectionFormat="of" target="authz"/>) are available,
the pledge initiates EDHOC to the lake-authz.arpa anycast address,
sending an encrypted identifier for its MASA (party W) in EAD_1.</t>
      <section anchor="applicability-preconditions">
        <name>Applicability preconditions</name>
        <t>While ACE in general does not constrain the type of tokens used,
or how the authorization space is split up,
using the extensions of this document introduces additional conditions:</t>
        <ul spacing="normal">
          <li>
            <t>The key used to authenticate the token is a COSE key,
and <xref target="CWT"/> are used as tokens.  </t>
            <t>
The alternative to this constraint is to declare this a blob of some key;
what it is depends would be preconfigured in the RS.
While this is the general approach of ACE,
the author considers it unsuitable for this particular case where a concrete identifier is assigned
and thus should have concrete semantics.
Users of any other key format may use this document as scaffolding for declaring an own YANG leaf instead.  </t>
            <t>
While this does allow symmetric keys in theory
(and they are used in ACE, for example in the <xref target="ace-oscore"/>) profile),
they should not be used in BRSKI deployments,
as the secret key would be shared with the MASA as it signs the voucher.
[ See also the Open Questions section. ]</t>
          </li>
          <li>
            <t>The pledge is identified with a single audience value.
(More precisely, there is an "aud" claim conveyed in the CWTs that can be checked for equality against a configured value).  </t>
            <t>
This rules out setups in which multiple security systems coinhabit the pledge,
are enrolled in a single step to a single AS,
but act independently at runtime.  </t>
            <t>
Future iterations of this document may relax this,
but will always need to express a condition based on which the pledge will know whether or not it may act on a token.</t>
          </li>
        </ul>
        <t>Using these extensions introduces no constraints on the type of scope values used with tokens.
The structure of scope values needs to be agreed between the AS and the RS out of band.
Typically, the AS will have configured knowledge of how to generate scope values that match the hard-coded model of the RS's firmware
from authorizations of its native model.</t>
      </section>
    </section>
    <section anchor="voucher-extensions">
      <name>Voucher extensions</name>
      <t>This specification adds two leaf nodes to the voucher artifact
defined in <xref section="6.1" sectionFormat="of" target="_8366bis"/>
[ this is currently done in a monkey-sees-monkey-does fashion,
rather than having the yang files standalone and using pyang to build the tree as is done in 8366bis ]:</t>
      <artwork><![CDATA[
module: ietf-voucher
  augment voucher:
    +-- ace-as-key?                      binary
    +-- ace-aud?                         string
]]></artwork>
      <section anchor="yang-module">
        <name>YANG Module</name>
        <sourcecode markers="true" name="ietf-ace-brski-ace@2023-07-07.yang"><![CDATA[

module ietf-ace-brski-ace {
  yang-version 1.1;

  namespace "urn:ietf:params:xml:ns:yang:ietf-ace-brski-ace";

  prefix vch-ace;

  import ietf-voucher {
    prefix vch;
    reference "I-D.ietf-anima-rfc8366bis-07";
  }

  organization
    "IETF ACE (Authentication and Authorization for Constrained Environments)
    Working Group";

  contact
    "WG Web:   <http://tools.ietf.org/wg/ace/>
     WG List:  <mailto:ace@ietf.org>

     Editor:   Christian Amsüss
               <mailto:christian@amsuess.com>";

  description
    "This module augments the voucher artifact for bootstrapping
    (onboarding) with mechanisms for onboarding onto ACE (Authentication
    and Authorization for Constrained Environments) Authorization
    Servers.

    Copyright (c) 2019 IETF Trust and the persons identified as
    authors of the code. All rights reserved.

    Redistribution and use in source and binary forms, with or
    without modification, is permitted pursuant to, and subject
    to the license terms contained in, the Simplified BSD License
    set forth in Section 4.c of the IETF Trust's Legal Provisions
    Relating to IETF Documents
    (http://trustee.ietf.org/license-info).

    This version of this YANG module is part of RFC XXXX; see the
    RFC itself for full legal notices.";

  revision 2023-07-07 {
    description
      "Initial revision.";

    reference
      "I-D.amsuess-ace-brski-ace, Provisioning ACE credentials through
      BRSKI";
  }

  uses "vch:voucher-artifact-grouping" {
    augment "voucher" {
      description
        "Mechanisms for onboarding onto ACE (Authentication and Authorization
        for Constrained Environments) Authorization Servers";

      leaf ace-as-key {
        type binary;
        description
          "Key(s) held by the ACE Authorization Server by which it
          authenticates (and the Resource Server verifies) tokens.
          It is a CBOR encoded COSE_KeySet.";
        reference
          "I-D.amsuess-ace-brski-ace, Provisioning ACE credentials
          through BRSKI";
      }

      leaf ace-aud {
        type string;
        description
          "Audience identifier by which the ACE Authorization Server
          will be the pledge that is enrolled as an ACE Resource
          Server.";
        reference
          "I-D.amsuess-ace-brski-ace, Provisioning ACE credentials
          through BRSKI";
      }
    }
  }
}

]]></sourcecode>
        <t>A device accepting this voucher will accept tokens signed with the credials expressed as a COSE key in the ace-as-pubk field,
provided they are issued with an audience value of "jada89".</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>[ TBD; in particular the open question on symmetric keys. ]</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>[ TBD: Request this for the YANG Module Names Registry;
the module itself is registered differently. ]</t>
    </section>
    <section anchor="open-questions">
      <name>Open questions</name>
      <ul spacing="normal">
        <li>There are probably missing steps in this specification;
the current draft's intention is primarily to start discussion.</li>
        <li>
          <t>Is there a shorter route to the same result I missed (and should take instead)?  </t>
          <t>
Is there a longer route (doing EST style onboarding into a PKI, and then obtain AS data by using those certificates) that I missed (and could reference and learn from)?</t>
        </li>
        <li>
          <t>Is there existing YANG terminology for ACE (or just OAuth) to use?  </t>
          <t>
There was some OAuth in the YANG of draft-kwatsen-netconf-http-client-server-03,
but that was just FIXMEs, and later removed.</t>
        </li>
        <li>AIU the voucher artifact data assembled by the registrar travels to the MASA to be signed during BRSKI.
That's fine when we're shipping a pinned-domain-cert,
and also when we're shipping as-public-key and an audience identifier (for the ACE EDHOC profile),
but not when shipping a shared key (for the ACE OSCORE profile).</li>
        <li>Is this suitable use of BRSKI and the voucher?</li>
        <li>
          <t>This document currently only describes expressing the ACE details in YANG for an ACE voucher.  </t>
          <t>
For use with more EST-like enrollments,
it could define resources equivalent to the rt=ace.est.sen resources.  </t>
          <t>
Alternatively, such setups could use COMI to manipulate the AS.
(But in the EST direction, would this need "pull mode COMI"?)</t>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="_8366bis">
          <front>
            <title>A Voucher Artifact for Bootstrapping Protocols</title>
            <author fullname="Kent Watsen" initials="K." surname="Watsen">
              <organization>Watsen Networks</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software</organization>
            </author>
            <author fullname="Max Pritikin" initials="M." surname="Pritikin">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Toerless Eckert" initials="T. T." surname="Eckert">
              <organization>Futurewei Technologies Inc.</organization>
            </author>
            <author fullname="Qiufang Ma" initials="Q." surname="Ma">
              <organization>Huawei</organization>
            </author>
            <date day="7" month="February" year="2023"/>
            <abstract>
              <t>   This document defines a strategy to securely assign a pledge to an
   owner using an artifact signed, directly or indirectly, by the
   pledge's manufacturer.  This artifact is known as a "voucher".

   This document defines an artifact format as a YANG-defined JSON or
   CBOR document that has been signed using a variety of cryptographic
   systems.

   The voucher artifact is normally generated by the pledge's
   manufacturer (i.e., the Manufacturer Authorized Signing Authority
   (MASA)).

   This document updates RFC8366, merging a number of extensions into
   the YANG.  The RFC8995 voucher request is also merged into this
   document.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-anima-rfc8366bis-07"/>
        </reference>
        <reference anchor="CWT">
          <front>
            <title>CBOR Web Token (CWT)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="E. Wahlstroem" initials="E." surname="Wahlstroem"/>
            <author fullname="S. Erdtman" initials="S." surname="Erdtman"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="May" year="2018"/>
            <abstract>
              <t>CBOR Web Token (CWT) is a compact means of representing claims to be transferred between two parties. The claims in a CWT are encoded in the Concise Binary Object Representation (CBOR), and CBOR Object Signing and Encryption (COSE) is used for added application-layer security protection. A claim is a piece of information asserted about a subject and is represented as a name/value pair consisting of a claim name and a claim value. CWT is derived from JSON Web Token (JWT) but uses CBOR rather than JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8392"/>
          <seriesInfo name="DOI" value="10.17487/RFC8392"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="authz">
          <front>
            <title>Lightweight Authorization for EDHOC</title>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="John Preuß Mattsson" initials="J. P." surname="Mattsson">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Mališa Vučinić" initials="M." surname="Vučinić">
              <organization>INRIA</organization>
            </author>
            <author fullname="Michael Richardson" initials="M." surname="Richardson">
              <organization>Sandelman Software Works</organization>
            </author>
            <author fullname="Aurelio Schellenbaum" initials="A." surname="Schellenbaum">
              <organization>Institute of Embedded Systems, ZHAW</organization>
            </author>
            <date day="21" month="April" year="2023"/>
            <abstract>
              <t>   This document describes a procedure for augmenting the lightweight
   authenticated Diffie-Hellman key exchange protocol EDHOC with third
   party assisted authorization, targeting constrained IoT deployments
   (RFC 7228).

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-selander-lake-authz-02"/>
        </reference>
        <reference anchor="ace-oscore">
          <front>
            <title>The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework</title>
            <author fullname="Francesca Palombini" initials="F." surname="Palombini">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Ludwig Seitz" initials="L." surname="Seitz">
              <organization>Combitech</organization>
            </author>
            <author fullname="Göran Selander" initials="G." surname="Selander">
              <organization>Ericsson AB</organization>
            </author>
            <author fullname="Martin Gunnarsson" initials="M." surname="Gunnarsson">
              <organization>RISE</organization>
            </author>
            <date day="6" month="May" year="2021"/>
            <abstract>
              <t>This document specifies a profile for the Authentication and Authorization for Constrained Environments (ACE) framework.  It utilizes Object Security for Constrained RESTful Environments (OSCORE) to provide communication security and proof-of-possession for a key owned by the client and bound to an OAuth 2.0 access token.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-ace-oscore-profile-19"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
