<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version  (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-amsuess-lake-edhoc-grease-00" category="info" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to EDHOC Extensibility</title>
    <seriesInfo name="Internet-Draft" value="draft-amsuess-lake-edhoc-grease-00"/>
    <author initials="C." surname="Amsüss" fullname="Christian Amsüss">
      <organization/>
      <address>
        <postal>
          <country>Austria</country>
        </postal>
        <email>christian@amsuess.com</email>
      </address>
    </author>
    <date year="2024" month="April" day="23"/>
    <workgroup>LAKE</workgroup>
    <abstract>
      <t>This document applies the extensibility mechanism GREASE (Generate Random Extensions And Sustain Extensibility),
which was pioneered for TLS,
to the EDHOC ecosystem.
It reserves a set of non-critical EAD labels and unusable cipher suites
that may be included in messages
to ensure peers correctly handle unknown values.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    Constrained RESTful Environments Working Group mailing list (core@ietf.org),
    which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/core/"/>.</t>
      <t>Source for this draft and an issue tracker can be found at
    <eref target="https://gitlab.com/chrysn/core-edhoc-grease"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>[ See abstract ]</t>
      <t>The introduction of <xref target="RFC8701"/> and <xref section="3.3" sectionFormat="of" target="RFC9170"/> provide comprehensive motivation for adding such extensions;
<xref target="I-D.edm-protocol-greasing-02"/> provides additional background that influenced this document.</t>
      <t>The extension points of the EDHOC protocol (<xref target="RFC9528"/>) are
cipher suites,
methods,
EADs (External Authorization Data items)
and COSE headers.
This document utilizes the cipher suite and EAD extension points.</t>
      <t>Unlike in TLS GREASE <xref target="RFC8701"/>,
EDHOC is operating on tight bandwidth and message size budget,
with some messages just barely fitting within relevant networks' fragmentation limits.
Thus,
more than with TLS GREASE,
it is up to implementations to decide
whether in their particular use case
they can afford to send addtional data.</t>
      <section anchor="variability-in-other-extension-points">
        <name>Variability in other extension points</name>
        <t>If the selected method or the used COSE heades are unsupported by the peer,
EDHOC does not conclude successfully.
While values could be reserved for these for use as GREASE,
these failed attempts would not be verified between the EDHOC participants
without maintaining state between attempted EDHOC sessions.
Such an addition is considered impractical for constrained devices,
and thus out of scope for this document.</t>
        <t>Recommendations for GREASE <xref section="4" sectionFormat="of" target="I-D.edm-protocol-greasing-02"/>
also include varying other aspects of the protocol,
such as varying sequences of elements.
EDHOC has little known variability,
and intentionally limits choice at times
(for example, <xref section="3.3.2" sectionFormat="of" target="RFC9528"/> allows only the numeric identifier form where that is possible).
Where variation is allowed,
e.g. in padding or in the ordering of EAD options,
applications are encouraged to exercise it.</t>
      </section>
    </section>
    <section anchor="the-grease-ead-labels">
      <name>The GREASE EAD labels</name>
      <t>This document registers the following EAD labels as GREASE EADs:</t>
      <t>160, 41120, 43690, 44975</t>
      <t>These EADs are available in all EDHOC messages.
The EADs are only used in their positive (non-critical) form.</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <section anchor="use-of-grease-eads-by-message-senders">
        <name>Use of GREASE EADs by message senders</name>
        <t>A sender of an EDHOC message MAY send a GREASE EAD using the non-critical (positive) form at any time,
with any or no EAD value (that is, with or without a byte string of any usable length),
in any message.</t>
        <t>Senders SHOULD consider the properties of the network their messages are sent over,
and refrain from adding GREASE when its use would be detrimental to the network
(for example, when the added size causes fragmentation of the message).</t>
        <t>On networks where the data added by the grease EADs does not significantly impact the network,
senders SHOULD irregularly send arbitrary (possibly random) GREASE EADs with their messages
to ensure that errors resulting from the use of GREASE are detected.</t>
        <t>The GREASE EADs MAY be used as an alternative form of padding.</t>
        <section anchor="suggested-pattern">
          <name>Pattern for limited fingerprinting</name>
          <t>A method of deciding how to apply GREASE is suggested as follows:</t>
          <ul spacing="normal">
            <li>
              <t>For every message, use GREASE with a random probability of 1 in 64.</t>
            </li>
            <li>
              <t>Pick a random GREASE label out of the uniform distribution of available options.</t>
            </li>
            <li>
              <t>Pick a random length from the uniformly distributed interval 9 to 40 (inclusive).</t>
            </li>
            <li>
              <t>Add the selected GREASE label with a value of the selected length,
filled with random bytes.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="use-of-grease-eads-by-message-recipients">
        <name>Use of GREASE EADs by message recipients</name>
        <t>A party receiving a GREASE EAD MUST NOT alter its behavior
in any way that would allow random GREASE EADs
to alter the security context that gets established.</t>
        <t>It MAY alter its behavior in other ways;
in particular, it SHOULD randomly insert GREASE EADs
in later messages of an exchange in which unprocessed EADs (including GREASE EADs) were present.</t>
        <t>Implementations SHOULD NOT attempt to recognize GREASE EADs,
and apply the default processing rules.</t>
      </section>
    </section>
    <section anchor="grease-cipher-suites">
      <name>GREASE cipher suites</name>
      <t>This document registers the following cipher suites:</t>
      <t>160, 41120, -41121, 43690</t>
      <t>It is expected that future documents register additional values with the same semantics.</t>
      <t>An initiator may insert a GREASE cipher suite
at any position in its sequence of preferred cipher suites.</t>
      <t>A responder MUST NOT support any of these cipher suites,
and MUST treat them like any other cipher suite it does not support.</t>
      <t>Thus, these cipher suites never occur as the selected cipher suite.
An initiator whose choice of a GREASE cipher suite is accepted
needs to discontinue the protocol.</t>
    </section>
    <section anchor="processing-of-grease-related-failures">
      <name>Processing of GREASE related failures</name>
      <t>It is RECOMMENDED that any counters or statistics about successful and failed connections
distinguish between connections in which GREASE was applied and those in which it was not applied.
Any operator feedback channel, be it immediately to the user or through network monitoring,
SHOULD warn the operator if there are errors that were determined to originate from the use of GREASE
or that are significantly likely to originate from there.
This provides a feedback path as described in <xref section="4.4" sectionFormat="of" target="RFC9170"/>.</t>
      <t>Whether logging of GREASE related failed connection details is appropriate
depends on the privacy policies of the application.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy considerations</name>
      <t>The way in which GREASE is applied
can contribute to identifying which implementation of EDHOC
is being used.
Implementers of EDHOC are encouraged to use the algorithm described in <xref target="suggested-pattern"/>,
both to reduce the likelihood of their implementation to be identified through the use of GREASE
and to increase the anonymity set of other users of the same algorithm.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The use of the GREASE option has no impact on security
in a correct EDHOC implementation.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA considerations</name>
      <section anchor="edhoc-eads">
        <name>EDHOC EADs</name>
        <t>IANA is requested to register
four new entries into the EDHOC External Authorization Data Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, 43690, 44975</t>
        <t>All share the name "GREASE",
the description "Arbitrary data to ensure extensibility",
and this document as a reference.</t>
      </section>
      <section anchor="edhoc-cipher-suites">
        <name>EDHOC cipher suites</name>
        <t>IANA is requested to register
four new values into the EDHOC Cipher Suites Registry
established in <xref target="RFC9528"/>:</t>
        <t>160, 41120, -41121, 43690</t>
        <t>All share the name "GREASE",
the array N/A,
the description "Unimplementable cipher suite to ensure extensibility",
and this document as a reference.</t>
      </section>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC9528">
          <front>
            <title>Ephemeral Diffie-Hellman Over COSE (EDHOC)</title>
            <author fullname="G. Selander" initials="G." surname="Selander"/>
            <author fullname="J. Preuß Mattsson" initials="J." surname="Preuß Mattsson"/>
            <author fullname="F. Palombini" initials="F." surname="Palombini"/>
            <date month="March" year="2024"/>
            <abstract>
              <t>This document specifies Ephemeral Diffie-Hellman Over COSE (EDHOC), a very compact and lightweight authenticated Diffie-Hellman key exchange with ephemeral keys. EDHOC provides mutual authentication, forward secrecy, and identity protection. EDHOC is intended for usage in constrained scenarios, and a main use case is to establish an Object Security for Constrained RESTful Environments (OSCORE) security context. By reusing CBOR Object Signing and Encryption (COSE) for cryptography, Concise Binary Object Representation (CBOR) for encoding, and Constrained Application Protocol (CoAP) for transport, the additional code size can be kept very low.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9528"/>
          <seriesInfo name="DOI" value="10.17487/RFC9528"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8701">
          <front>
            <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8701"/>
          <seriesInfo name="DOI" value="10.17487/RFC8701"/>
        </reference>
        <reference anchor="RFC9170">
          <front>
            <title>Long-Term Viability of Protocol Extension Mechanisms</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="T. Pauly" initials="T." surname="Pauly"/>
            <date month="December" year="2021"/>
            <abstract>
              <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9170"/>
          <seriesInfo name="DOI" value="10.17487/RFC9170"/>
        </reference>
        <reference anchor="I-D.edm-protocol-greasing-02">
          <front>
            <title>Maintaining Protocols Using Grease and Variability</title>
            <author fullname="Lucas Pardue" initials="L." surname="Pardue">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   Long-term interoperability of protocols is an important goal of the
   network standards process.  Part of realizing long-term protocol
   deployment success is the ability to support change.  Change can
   require adjustments such as extension to the protocol, modifying
   usage patterns within the current protocol constraints, or a
   replacement protocol.  This document present considerations for
   protocol designers and implementers about applying techniques such as
   greasing or protocol variability as a means to exercise maintenance
   concepts.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-edm-protocol-greasing-02"/>
        </reference>
      </references>
    </references>
    <section anchor="open-questions">
      <name>Open questions</name>
      <t>Do the GREASE EADs add any value that padding does not already add?</t>
      <t>Probably yes, because padding is "special enough" that it could be handled in a hard-coded fashion.
(Then again, there's nothing but the effort stopping anyone else from doing the same with the GREASE EADs, right?)</t>
      <t>Can anything be done about extra methods and COSE headers?</t>
      <t>They would not result in successful operations,
but maybe there is still some value in registering one or two --
using them would mean sacrificing the full connection,
but it may still be possible to conclude that the extension points are in order
from watching the EDHOC exchange fail in the predicted way.</t>
    </section>
    <section anchor="change-log">
      <name>Change log</name>
      <t>Since draft-amsuess-core-edhoc-grease-01:</t>
      <ul spacing="normal">
        <li>
          <t>Update references to RFC9528 🎉</t>
        </li>
        <li>
          <t>Change target WG to LAKE, renaming to draft-amsuess-lake-edhoc-grease</t>
        </li>
        <li>
          <t>Process RFC9170
          </t>
          <ul spacing="normal">
            <li>
              <t>Add a section on failure processing</t>
            </li>
            <li>
              <t>Reference where appropriate</t>
            </li>
          </ul>
        </li>
        <li>
          <t>Process draft-edm-protocol-greasing-02
          </t>
          <ul spacing="normal">
            <li>
              <t>Variability outside of extension points</t>
            </li>
            <li>
              <t>Be firmer against recognizing GREASE values</t>
            </li>
            <li>
              <t>Point out that future options may be registered (instead of the suggested algorithmic registrations)</t>
            </li>
          </ul>
        </li>
      </ul>
      <t>Since -00:</t>
      <ul spacing="normal">
        <li>
          <t>Fixed a mix-up between positivity and criticality of options.</t>
        </li>
        <li>
          <t>Adjusted numbers accordingly to once more fit in the <tt>0xa.</tt> pattern
(actually they're using <tt>0x.a</tt>, but that doesn't work the same way with CBOR).</t>
        </li>
        <li>
          <t>Text improvements around recipient side processing.</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Marco Tiloca pointed out a critical error in the numeric constructions.
Göran Selander provided input to reduce mistakable text.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
